$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Apparatus and method for providing a secure gateway for communication and data exchanges between networks 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/00
출원번호 US-0342772 (1994-11-21)
발명자 / 주소
  • Vu Hung T. (Ottawa CAX)
출원인 / 주소
  • Milkway Networks Corporation (Ottawa CAX 03)
인용정보 피인용 횟수 : 766  인용 특허 : 0

초록

An apparatus and method for providing a secure firewall between a private network and a public network are disclosed. The apparatus is a gateway station having an operating system that is modified to disable communications packet forwarding, and further modified to process any communications packet

대표청구항

A method of providing a secure gateway between a private network and a potentially hostile network, comprising the steps of: (a) addressing communications packets directly to a host on the potentially hostile network as if there were a communications path to the host, but encapulating the packets wi

이 특허를 인용한 특허 (766)

  1. Luna, Michael; Fiatal, Trevor A., 3D mobile user interface with configurable workspace management.
  2. Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Access and control system for network-enabled devices.
  3. Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Access and control system for network-enabled devices.
  4. Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Access and control system for network-enabled devices.
  5. Williams Charles S., Access control system and method using hierarchical arrangement of security devices.
  6. Cohn, Alan Wade; Faulkner, Gary Robert; Kitchen, James Edward; Proft, David Leon; Quain, Corey Wayne, Activation of a home automation controller.
  7. Bryan, Marc; Kitchen, Jim; Boyd, Weston, Activation of gateway device.
  8. Egan, Kenneth W.; Dearman, Clay, Adaptive Power Modulation.
  9. Kirchhoff,Debra C.; Boyle,Steven C., Adaptive Voice-over-Internet-Protocol (VoIP) testing and selecting transport including 3-way proxy, client-to-client, UDP, TCP, SSL, and recipient-connect methods.
  10. Schneck Phyllis A. ; Schwan Karsten ; Chokhani Santosh, Adaptive data security system and method.
  11. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  12. Egan, Kenneth W.; Dearman, Clay, Adaptive power modulation.
  13. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  14. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  15. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  16. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  17. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  18. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D., Agile network protocol for secure communications with assured system availability.
  19. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D.; Schmidt, Douglas Charles, Agile network protocol for secure communications with assured system availability.
  20. Munger, Edmund Colby; Schmidt, Douglas Charles; Short, III, Robert Dunham; Larson, Victor; Williamson, Michael, Agile network protocol for secure video communications with assured system availability.
  21. Luna, Michael; Tervahauta, Mikko, Aligning data transfer to optimize connections established for transmission over a wireless network.
  22. van der Made, Peter A. J., Analytical virtual machine.
  23. van der Made,Peter A. J., Analytical virtual machine.
  24. Doviak, William; Whitmore, David L.; Houvig, Flex, Apparatus and method for intelligent routing of data between a remote device and a host system.
  25. Satapati, Suresh, Apparatus and methods for handling name resolution over IPV6 using NAT-PT and DNS-ALG.
  26. Somasundaram,Mahadev; Jayasenan,Siva S.; Sivakumar,Senthil M., Apparatus and methods for performing network address translation (NAT) in a fully connected mesh with NAT virtual interface (NVI).
  27. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Apparatus for providing security over untrusted networks.
  28. Mannette, Michael R.; Newlin, Douglas J.; Steinbrenner, Kurt W., Apparatus, method and system for multimedia access network channel management.
  29. Bowers, John Joseph; Peterson, Matthew T, Apparatus, systems and methods to provide authentication services to a legacy application.
  30. Luna, Michael; Tsõmbaljuk, Andrei, Application and network-based long poll request detection and cacheability assessment therefor.
  31. Luna, Michael; Tsõmbaljuk, Andrei, Application and network-based long poll request detection and cacheability assessment therefor.
  32. Luna, Michael; Tsõmbaljuk, Andrei, Application and network-based long poll request detection and cacheability assessment therefor.
  33. Backholm, Ari; Liang, Sheng, Application discovery on mobile devices.
  34. Ylönen, Tatu; Kivinen, Tero; Levlin, Markus, Application gateway system and method for maintaining security in a packet-switched information network.
  35. Ben-Itzhak, Yuval, Application layer security method and system.
  36. Ismail, Mohanad; Wendling, Michael; Backholm, Ari, Application or context aware fast dormancy.
  37. Ben Itzhak,Yuval, Application-layer security method and system.
  38. Nilsen, B.o slashed.rge, Arrangement in a data communication system.
  39. Warrier,Ulhas S.; Lewites,Saul; Iyer,Prakash N., Assigning a source address to a data packet based on the destination of the data packet.
  40. Brownell, David, Authenticated firewall tunneling framework.
  41. Brownell,David, Authenticated firewall tunneling framework.
  42. Ahlberg, Axel H.; Becar, Allyn P.; Brand, Gregory L.; Fenley, Douglas B.; Jones, Chester L.; Wyrick, Robert E., Authentication and entitlement for users of web based data management programs.
  43. Wesinger ; Jr. Ralph E. ; Coley Christopher D., Automated on-line information service and directory, particularly for the world wide web.
  44. Wesinger ; Jr. Ralph E. ; Coley Christopher D., Automated on-line information service and directory, particularly for the world wide web.
  45. Cohn, Alan Wade; Faulkner, Gary Robert; Kitchen, James Edward; Proft, David Leon; Quain, Corey Wayne, Automated reporting of account and sensor information.
  46. Kaminsky, Ross G.; Angell, Richard A.; Evora, Gordon D., Automated trading exchange system having integrated quote risk monitoring and integrated quote modification services.
  47. Montesano, Anthony; Kaminsky, Ross G.; Angell, Richard A.; Evora, Gordon D., Automated trading exchange system having integrated quote risk monitoring and integrated quote modification services.
  48. Luna, Michael; Bott, Ross, Automatic generation and distribution of policy information regarding malicious mobile traffic in a wireless network.
  49. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Automatically reconnecting a client across reliable and persistent communication sessions.
  50. Raji, Reza; Gutt, Gerald, Automation system with mobile interface.
  51. Fiatal, Trevor, Bandwidth measurement.
  52. Ebrahimi, Hashem Mohammad; Major, Robert Drew, Brokering state information and identity among user agents, origin servers, and proxies.
  53. Underwood, Roy Aaron, Business components framework.
  54. Luna, Michael; Ponomarenko, Andrei, Cache defeat detection and caching of content addressed by identifiers intended to defeat cache.
  55. Luna, Michael; Ponomarenko, Andrei, Cache defeat detection and caching of content addressed by identifiers intended to defeat cache.
  56. Luna, Michael, Cache state management on a mobile device to preserve user experience.
  57. Froehlich, Robert W.; Govindarajan, Rangaprasad; Pathak, Jogen K; Shanbhag, Vyankatesh, Cell level congestion policy management.
  58. Robinson, Kyle Lane; Bowers, John Joseph, Centralized user authentication system apparatus and method.
  59. Robinson, Kyle Lane; Bowers, John Joseph, Centralized user authentication system apparatus and method.
  60. Caronni, Germano; Gupta, Amit; Markson, Tom R.; Kumar, Sandeep; Schuba, Christoph L.; Scott, Glenn C., Channel-specific file system views in a private network using a public-network infrastructure.
  61. Dawes, Paul; Baum, Marc; Wood, Aaron, Communication protocols in integrated systems.
  62. Decenzo, Chris; Baum, Marc; Dawes, Paul; Chu, Frank, Communication protocols over internet protocol (IP) networks.
  63. Teraoka Fumio,JPX, Communication system and communication apparatus.
  64. Unger, Jay; Leone, Paul; Hyatt, Don; Rauch, Thyra, Compiled structure for efficient operation of distributed hypertext.
  65. van der Made,Peter A. J., Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine.
  66. van der Made, Peter A. J., Computer immune system and method for detecting unwanted code in a computer system.
  67. van der Made,Peter A. J, Computer immune system and method for detecting unwanted code in a computer system.
  68. Grosse Eric, Computer security using virus probing.
  69. Lindeberg Jan H. I.,DKX ; Smidt Allan,DKX ; Hammarstrom Peter,DKX, Computer telephony integration gateway.
  70. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Computerized access device with network security.
  71. Fiatal, Trevor A.; Boynton, Lee R.; Burke, Scott M.; Gustafson, Brian D.; Raj, Binu; Alvarado, William; Benitez, Juan; Duncan, Fred J., Connection architecture for a mobile network.
  72. Fiatal,Trevor A.; Boynton,Lee R.; Burke,Scott M.; Gustafson,Brian D.; Raj,Binu; Alvarado,William; Benitez,Juan; Duncan,Fred J., Connection architecture for a mobile network.
  73. Backholm, Ari; Salorinne, Seppo; Saarilahti, Antti; Ketonen, Marko; Vuornos, Lauri; Salmi, Petri, Connectivity function for forwarding e-mail.
  74. Fiatal, Trevor, Content delivery to a mobile device from a content service.
  75. Alvarado, Billy; Ariel, Ido; van Gent, Robert Paul, Context aware data presentation.
  76. Holt Robert Hugh,CAX ; Gibson Robert Thomas,CAX ; Myers Robert,CAX, Control in a data access transport service.
  77. Li Bobby ; Chen Eva, Controlled distribution of application programs in a computer network.
  78. Cohn, Alan Wade; Dial, IV, John Degraffenreid; Faulkner, Gary Robert; Kitchen, James Edward; Proft, David Leon; Quain, Corey Wayne, Controller and interface for home security, monitoring and automation having customizable audio alerts for SMA events.
  79. Fulker, Jim; Sundermeyer, Ken; Dawes, Paul J., Cross-client sensor user interface in an integrated security network.
  80. Fulker, Jim; Sundermeyer, Ken; Dawes, Paul J.; Raji, Reza, Cross-client sensor user interface in an integrated security network.
  81. Fleming, Michael, Cross-platform event engine.
  82. Devine,Carol Y.; Shoulberg,Richard W.; Shifrin,Gerald A.; Pfister,Robert A.; Fenley,Douglas B.; Suscheck,Charles A.; Delano,P. Alex; Kennington,W. Russell; Brandt,Andre R.; Pillai,Sajan J.; Schwarz,Edward; Shamash,Arieh, Customer interface system for managing communications services including toll free services.
  83. Backholm, Ari; Ahonen, Jukka; Groeber, Marcus; Salorinne, Seppo; Vuornos, Lauri; Saarlilahti, Antti; Ketonen, Marko; Salmi, Petri, Data security in a mobile e-mail service.
  84. Brandt, Andre R.; Frueh, Barbara; Pillai, Sajan J.; Rehder, Karl; Shearer, Donald J., Data warehousing infrastructure for web based reporting tool.
  85. Ylinen, Heikki, Database synchronization.
  86. Backholm, Ari; Salorinne, Seppo; Ylinen, Heikki; Groeber, Marcus; Vuornos, Lauri; Ikonen, Rauli; Ahonen, Jukka; Everitt, Andrew; McLeod, Allan; Salmi, Petri, Database synchronization via a mobile network.
  87. Backholm, Ari; Salorinne, Seppo; Ylinen, Heikki; Groeber, Marcus; Vuornos, Lauri; Ikonen, Rauli; Ahonen, Jukka; Everitt, Andrew; McLeod, Allan; Salmi, Petri, Database synchronization via a mobile network.
  88. Caronni,Germano; Gupta,Amit; Markson,Tom R.; Kumar,Sandeep; Schuba,Christoph L.; Scott,Glenn C., Decoupling access control from key management in a network.
  89. Cohn, Alan Wade; Dial, IV, John Degraffenreid; Faulkner, Gary Robert; Kitchen, James Edward; Proft, David Leon; Quain, Corey Wayne, Defining and implementing sensor triggered response rules.
  90. Luna, Michael, Detecting and preserving state for satisfying application requests in a distributed proxy and cache system.
  91. Luna, Michael; Bott, Ross, Detection and management of user interactions with foreground applications on a mobile device in distributed caching.
  92. Luna, Michael; Bott, Ross, Device resources sharing for network resource conservation.
  93. Poletto, Massimiliano Antonio; Kohler, Jr., Edward W., Device to protect victim sites during denial of service attacks.
  94. Peterson, Matthew T.; Webb, Jeff Marsden, Disconnected credential validation using pre-fetched service tickets.
  95. Peterson, Matthew T.; Webb, Jeff Marsden, Disconnected credential validation using pre-fetched service tickets.
  96. Luna, Michael; Haines, John, Distributed caching for resource and mobile network traffic management.
  97. Luna, Michael; Tsõmbaljuk, Andrei, Distributed caching in a wireless network of content delivered for a mobile application over a long-held request.
  98. Backholm, Ari; Luna, Michael, Distributed implementation of dynamic wireless traffic policy.
  99. Luna, Michael; Tervahauta, Mikko, Distributed management of keep-alive message signaling for mobile network resource conservation and optimization.
  100. Edward Robert Segal, Distributed security system for a communication network.
  101. Luna, Michael; Ponomarenko, Andrei, Distributed system for cache defeat detection and caching of content addressed by identifiers intended to defeat cache.
  102. Tervahauta, Mikko; Backholm, Ari; Salorinne, Seppo; Ahonen, Jukka; Daavittila, Mikko; Everitt, Andrew; Vuornos, Lauri, Dynamic adjustment of keep-alive message intervals in a mobile network.
  103. Luna, Michael, Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications.
  104. Luna, Michael; Bott, Ross, Dynamic categorization of applications for network access in a mobile network.
  105. Bellwood, Thomas Alexander; Lita, Christian; Rutkowski, Matthew Francis, Dynamic connection to multiple origin servers in a transcoding proxy.
  106. Goldberg, Ronen; Daniely, Gady; Zezak, Moshe; Shohat, Drory, Dynamic packet filter utilizing session tracking.
  107. Wadlow Thomas A. ; Kevin Joseph P., Dynamic policy-based apparatus for wide-range configurable network service authentication and access control using a fixed-path hardware configuration.
  108. Fairchild Steven E., Dynamic proxy server.
  109. Turley, Patrick; White, Eric, Dynamically adaptive network firewalls and method, system and computer program product implementing same.
  110. Turley, Patrick; White, Eric, Dynamically adaptive network firewalls and method, system and computer program product implementing same.
  111. Unger Jay ; Fuller Glen, Efficient method for compressing, storing, searching and transmitting natural language text.
  112. Jones,Douglas L.; Wimer, II,William C., Efficient transmission of IP data using multichannel SOCKS server proxy.
  113. Cornelius,Shawn S.; Donoughe,Clifford; Huffman,Arnold Z.; Klug,Matthew C.; Krahn,Richard R.; Kurup,Mohan; Madden,Edward; Sabaka,David E.; Su,Eric C.; Sweeney,Michael S., Electronic security system and scheme for a communications network.
  114. Backholm, Ari; Vuornos, Lauri, Electronic-mail filtering for mobile devices.
  115. Backholm, Ari; Vuornos, Lauri, Electronic-mail filtering for mobile devices.
  116. McKelvey Mark Ambrose, Embedded security processor.
  117. Panasyuk, Anatoliy; Pedersen, Bradley J.; Stone, David; Treder, Terry, Encapsulating protocol for session persistence and reliability.
  118. Schmid, Greg; Pickens, Keith S.; Heilmann, Craig; Smith, Kirk, Encapsulation, compression and encryption of PCM data.
  119. Schmid,Greg; Smith,Kirk; Pickens,Keith S.; Heilmann,Craig, Encapsulation, compression, and encryption of PCM data.
  120. Gore, Richard; Wilmes, Joshua; Conley, Alan; Pirouz, Mehrdad, End-to-end performance tool and method for monitoring electronic-commerce transactions.
  121. Bott, Ross, Enhanced customer service for mobile carriers using real-time and historical mobile application and traffic or optimization data associated with mobile devices in a mobile network.
  122. D'Angelo, Leo A.; Izadpanah, Kamran; Bell, John J., Enhancing messaging services using translation gateways.
  123. D'Angelo, Leo A.; Izadpanah, Kamran; Bell, John J., Enhancing messaging services using translation gateways.
  124. Ariel, Ido; van Gent, Robert Paul, Extending user relationships.
  125. Shand Ian Michael Charles,GBX ; Harper John Anthony,FRX ; Welch Steven Richard,GBX, Fast network layer packet filter.
  126. Curran, Robert J.; Haskin, Roger L., File level security for a metadata controller in a storage area network.
  127. Curran,Robert J.; Haskin,Roger L., File level security for a metadata controller in a storage area network.
  128. Haff, Maurice W.; Clarke, Christopher D., File transfer system.
  129. Haff,Maurice W.; Clarke,Christopher D., File transfer system.
  130. Haff, Maurice W.; Clarke, Christopher D., File transfer system for direct transfer between computers.
  131. Haff, Maurice W.; Clarke, Christopher D., File transfer system for direct transfer between computers.
  132. Haff Maurice W. ; Clarke Christopher D., File transfer system using dynamically assigned ports.
  133. Shrader Theodore Jack London, Filter rule validation and administration for firewalls.
  134. Toga, James E., Firewall for controlling data transfers between networks based on embedded tags in content description language.
  135. Shombert, Lee; James, Stephen; Carle, Jennifer; Friedman, David, Firewall for gateway network elements between IP based networks.
  136. Dowd,Patrick W.; McHenry,John T., Firewall for processing a connectionless network packet.
  137. Dowd, Patrick W.; McHenry, John T., Firewall for processing connection-oriented and connectionless datagrams over a connection-oriented network.
  138. Wesigner,Ralph E.; Coley,Christopher D., Firewall providing enhanced network security and user transparency.
  139. Wesinger ; Jr. Ralph E. ; Coley Christopher D., Firewall providing enhanced network security and user transparency.
  140. Wesinger, Jr., Ralph E.; Coley, Christopher D., Firewall providing enhanced network security and user transparency.
  141. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Firewall providing enhanced network security and user transparency.
  142. Dowd Patrick William ; Mchenry John Thomas, Firewall security apparatus for high-speed circuit switched networks.
  143. Coley Christopher D. ; Wesinger ; Jr. Ralph E., Firewall system for protecting network elements connected to a public network.
  144. Coley Christopher D. ; Wesinger ; Jr. Ralph E., Firewall system for protecting network elements connected to a public network.
  145. Toga, James E., Firewalls that filter based upon protocol commands.
  146. Luna, Michael, Flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation.
  147. Sutaria, Jay; Nanjundeswaran, Sridhar; Gustafson, Brian; van Gent, Robert, Flexible billing architecture.
  148. Backholm, Ari; Sawney, Parvinder, Flexible real-time inbox access.
  149. Backholm, Ari; Sawney, Parvinder, Flexible real-time inbox access.
  150. Baum, Marc; Dawes, Paul J.; Kinney, Mike; Raji, Reza; Swenson, David; Wood, Aaron, Forming a security network including integrated security system components.
  151. Baum, Marc; Dawes, Paul J., Forming a security network including integrated security system components and network devices.
  152. Baum, Marc; Dawes, Paul J.; Kinney, Mike; Raji, Reza; Swenson, David; Wood, Aaron, Forming a security network including integrated security system components and network devices.
  153. Kay Jeffrey Brian, Front-end proxy for transparently increasing web server functionality.
  154. Gutt, Gerald; Wood, Aaron, Gateway registry methods and systems.
  155. Sylvain, Dany; Larrigan, Scott, Gateway shared by multiple virtual private networks.
  156. Shanbhag, Vyankatesh, Gb parameter based radio priority.
  157. Miron, Mordechay, General purpose interpreter and database for accessing enterprise servers over an internet protocol network.
  158. Miron, Mordechay, General purpose interpreter and database for accessing enterprise servers over an internet protocol network.
  159. Stockwell Edward B. ; Klietz Alan E., Generalized security policy management system and method.
  160. Chmielewski, Tom; Kitchen, Jim, Generating risk profile using data of home monitoring and security system.
  161. Chmielewski, Tom; Kitchen, Jim, Generating risk profile using data of home monitoring and security system.
  162. Botz Patrick Samuel ; Moskalik Thomas Michael ; Snyder Devon Daniel ; Woodbury Carol Jean, Generic user authentication for network computers.
  163. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
  164. Bladow Chad R. ; Devine Carol Y. ; Schwarz Edward ; Shamash Arieh ; Shoulberg Richard W. ; Wood Jeffrey A., Graphical user interface for Web enabled applications.
  165. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  166. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  167. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  168. Luna, Michael; Bott, Ross, Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization.
  169. Millet, Mark E.; Ng, Chi-Shing, IP network for accomodating mobile users with incompatible network addressing.
  170. Vanyukhin, Nikolay; Shevnin, Oleg; Korotich, Alexey, Identity migration apparatus and method.
  171. Vanyukhin, Nikolay; Shevnin, Oleg; Korotich, Alexey, Identity migration apparatus and method.
  172. Fukasawa,Toshihiko; Tanaka,Kenichiro, Image processing system, image processing method, image upload system, storage medium, and image upload server.
  173. Felsher, David Paul, Information record infrastructure, system and method.
  174. Barry, B. Reilly; Chodoronek, Mark A.; DeRose, Eric; Devine, Carol Y.; Studness, Mark N.; James, Angela R.; Levy, Lynne; Tusa, Michael, Integrated business system for web based telecommunications management.
  175. Barry, B. Reilly; Chodoronek, Mark A.; DeRose, Eric; Gonzales, Mark N.; James, Angela R.; Levy, Lynne; Tusa, Michael, Integrated customer interface for web based data management.
  176. Devine, Carol Y.; Shoulberg, Richard W.; Shifrin, Gerald A.; Pfister, Robert A.; Fenley, Douglas B.; Suscheck, Charles A.; Delano, P. Alex; Kennington, W. Russell; Brandt, Andre R.; Pillai, Sajan J.;, Integrated customer interface system for communications network management.
  177. Baker,Thomas E.; Chaffee,Susan L.; Chen,Yuchien; Gruber,Charles J.; Fishman,Howard P., Integrated customer web station for web based call management.
  178. Cogger Timothy John ; Kunkel ; III Isaac A. ; Miller David Todd ; Patil Suma P., Integrated interface for Web based customer care and trouble management.
  179. Combar, Curtis T.; Devine, Carol Y.; Pfister, Robert A., Integrated interface for real time web based viewing of telecommunications network call traffic.
  180. Cogger, Timothy John; Kunkel, III, Isaac A.; Miller, David Todd; Patil, Suma P., Integrated interface for web based customer care and trouble management.
  181. Fiatal, Trevor, Integrated messaging.
  182. Fiatal, Trevor, Integrated messaging.
  183. Yadav, Satyendra, Integrated network intrusion detection.
  184. Yadav, Satyendra, Integrated network intrusion detection.
  185. Christine M. Ditmer ; James DeGraf-Johnson ; Paul Glenn Franklin ; William C. Holford ; Randall W. King ; Patrick W. Pirtle ; Kenneth Joseph Qualls ; Diane J. Wells ; Edward Ronald Zack, Jr., Integrated proxy interface for web based alarm management tools.
  186. Christine M. Ditmer ; Randall W. King ; W. Russell Kennington ; Patrick W. Pirtle ; Diane J. Wells, Integrated proxy interface for web based broadband telecommunications management.
  187. Andre R. Brandt ; Sajan J. Pillai, Integrated proxy interface for web based data management reports.
  188. Combar,Curtis T.; Devine,Carol Y.; Flentje,William P.; Pfister,Robert A., Integrated proxy interface for web based data management reports.
  189. Devine, Carol Y.; Dollar, Tammy E.; Munguia, Wayne J.; Schwarz, Edward, Integrated proxy interface for web based report requester tool set.
  190. Delano, P. Alex; Devine, Carol Y.; Hall, Robert W.; Pfister, Robert A.; Venn, Garrison M., Integrated proxy interface for web based telecommunication toll-free network management using a network manager for downloading a call routing tree to client.
  191. Curtis T. Combar ; Robert A. Pfister, Integrated proxy interface for web based telecommunications management tools.
  192. Wayne J. Munguia ; Robert A. Pfister ; Charles A. Suscheck, Integrated proxy interface for web based telecommunications network management.
  193. Dawes, Paul J.; Decenzo, Chris; Wales, Carolyn, Integrated security network with security alarm signaling system.
  194. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  195. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  196. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  197. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  198. Barry,B. Reilly; Chodoronek,Mark A.; DeRose,Eric; Gonzales,Mark N.; James,Angela R.; Levy,Lynne; Tusa,Michael, Integrated systems for providing communications network management services and interactive generating invoice documents.
  199. Dark,Susan Pittman, Intelligent feedback loop process control system.
  200. Shipley Peter M., Intelligent network security device and method.
  201. Shipley Peter M., Intelligent network security device and method.
  202. Fleming, Michael, Intelligent rendering of information in a limited display environment.
  203. Hall Phillip Earl ; Harris Jeffrey Martin ; Woodward Ernest Earl ; Borgstahl Ronald W., Interactive appliance security system and method.
  204. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  205. Duvall William S. ; Kendall Matthew, Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering a.
  206. Curry, James E.; Farris, Robert D., Internet long distance telephone service.
  207. Wootton Bruce Anthony ; Colvin William G.,CAX, Internet protocol filter.
  208. Liu, Lynn Y.; Guan, Xiaomei; Hayden, Michael E.; Ling, David, Internet settlement system.
  209. Chang Te-An ; Rostock Joseph R., Internet-web link for access to intelligent network service control.
  210. Roesch, Martin F.; Gula, Ronald J., Intrusion and misuse deterrence system employing a virtual network.
  211. Roesch,Martin F.; Gula,Ronald J., Intrusion and misuse deterrence system employing a virtual network.
  212. Craig H. Rowland, Intrusion detection system.
  213. Blair Steven Cameron ; Hassinger Sebastian ; Hurley ; II William W. ; Smith William Meyer ; Turek John J. E., Lightweight authentication system and method for validating a server access request.
  214. Fiatal, Trevor; Guesman, Jason, Location-based operations and messaging.
  215. Backholm, Ari; Salorinne, Seppo; Ahonen, Jukka; Daavittila, Mikko; Everitt, Andrew; Vuornos, Lauri, Maintaining an IP connection in a mobile network.
  216. Backholm, Ari; Salorinne, Seppo; Ahonen, Jukka; Daavittila, Mikko; Everitt, Andrew; Vuornos, Lauri, Maintaining an IP connection in a mobile network.
  217. Backholm, Ari; Salorinne, Seppo; Ahonen, Jukka; Daavittila, Mikko; Everitt, Andrew; Vuornos, Lauri, Maintaining an IP connection in a mobile network.
  218. Backholm, Ari; Ahonen, Jukka; Groeber, Marcus; Salorinne, Seppo; Vuornos, Lauri; Saarlilahti, Antti; Ketonen, Marko; Salmi, Petri, Maintaining mobile terminal information for secure communications.
  219. Shaio, Sami; Hoff, Arthur Van, Maintaining packet security in a computer network.
  220. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  221. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  222. Edery, Yigal Mordechai; Vered, Nirmrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  223. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  224. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  225. Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Managed peer-to-peer applications, systems and methods for distributed data access and storage.
  226. Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Managed peer-to-peer applications, systems and methods for distributed data access and storage.
  227. Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Managed peer-to-peer applications, systems and methods for distributed data access and storage.
  228. Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Managed peer-to-peer applications, systems and methods for distributed data access and storage.
  229. Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Managed peer-to-peer applications, systems and methods for distributed data access and storage.
  230. Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Managed peer-to-peer applications, systems and methods for distributed data access and storage.
  231. Chan, Frank, Management session initiation with a customer premises device.
  232. Luna, Michael; Bott, Ross, Managing cache to prevent overloading of a wireless network due to user activity.
  233. Underwood,Roy Aaron, Managing user information on an e-commerce system.
  234. Alvarado, Billy; Ariel, Ido; van Gent, Robert Paul, Managing user-to-user contact with inferred presence information.
  235. Mitchell, Julian; Sylvain, Dany; Larrigan, Scott, Media proxy having interface to multiple virtual private networks.
  236. Barnes, Mary H.; Hosain, Akram; Qaddoura, Emad A.; Akhtar, Haseeb, Merged packet service and mobile internet protocol.
  237. Low, Colin; Seaborne, Andrew Franklin; Bouthors, Nicolas, Method and apparatus for accessing communication data relevant to a target entity identified by a number string.
  238. Low, Colin; Seaborne, Andrew Franklin; Bouthors, Nicolas, Method and apparatus for accessing communication data relevant to a target entity identified by a number string.
  239. Low, Colin; Seaborne, Andrew Franklin; Bouthors, Nicolas, Method and apparatus for accessing communication data relevant to a target entity identified by a number string.
  240. Low, Colin; Seaborne, Andrew Franklin; Bouthors, Nicolas, Method and apparatus for accessing communication data relevant to a target entity identified by a number string.
  241. Low, Colin; Seaborne, Andrew Franklin; Bouthors, Nicolas, Method and apparatus for accessing service resource items that are for use in a telecommunications system.
  242. Ilnicki, Slawomir K.; Rice, James P., Method and apparatus for allowing a secure and transparent communication between a user device and servers of a data access network system via a firewall and a gateway.
  243. Hammond, Nicolas J., Method and apparatus for auditing network security.
  244. Liu Lynn Y. ; Lu Juan ; Wang Tao, Method and apparatus for authorizing remote internet access.
  245. Vogel, Mark O.; Robinson, Philip T., Method and apparatus for channel determination through power measurements.
  246. Aziz Ashar,PKX ; Markson Thomas, Method and apparatus for client-host communication over a computer network.
  247. Ko,Cheuk W., Method and apparatus for content-based instrusion detection using an agile kernel-based auditor.
  248. Haff, Maurice W.; Clarke, Christopher D., Method and apparatus for data file transfer using destination linked directories.
  249. Haff, Maurice W.; Clarke, Christopher D., Method and apparatus for data file transfer using destination linked directories.
  250. Klaus Christopher W., Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication sy.
  251. Wesinger, Jr., Ralph E.; Coley, Christopher D., Method and apparatus for electronically publishing information on a computer network.
  252. Hsu, Stephen Dao Hui; Hormuzdiar, James Noshir; Chun, Jon A, Method and apparatus for encrypted communications to a secure server.
  253. Hsu,Stephen Dao Hui; Hormuzdiar,James Noshir; Chun,Jon A, Method and apparatus for encrypted communications to a secure server.
  254. Hui Hsu, Stephen Dao; Hormuzdiar, James Noshir, Method and apparatus for encrypted communications to a secure server.
  255. Jay R. Gelman ; J. Scott Stadler, Method and apparatus for improving efficiency of TCP/IP protocol over high delay-bandwidth network.
  256. Fiatal, Trevor A.; Sutaria, Jay; Nanjundeswaran, Sridhar; Bavadekar, Shailesh, Method and apparatus for intercepting events in a communication system.
  257. Fiatal, Trevor; Sutaria, Jay; Nanjundeswaran, Sridhar; Bavadekar, Shailesh, Method and apparatus for intercepting events in a communication system.
  258. Fiatal,Trevor; Sutaria,Jay; Nanjundeswaran,Sridhar; Bavadekar,Shailesh, Method and apparatus for intercepting events in a communication system.
  259. Liu Quentin C., Method and apparatus for managing a virtual private network.
  260. Ide, Curtis E.; Brass, Philip C.; Doty, Theodore R., Method and apparatus for network assessment and authentication.
  261. Ide,Curtis E.; Brass,Philip C.; Doty,Theodore R., Method and apparatus for network assessment and authentication.
  262. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Method and apparatus for providing a dynamically-updating pay-for-service web site.
  263. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Method and apparatus for providing a pay-for-service web site.
  264. Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olsen, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  265. Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olsen, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  266. Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olson, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  267. Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olson, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  268. Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olson, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  269. Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olson, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  270. Hanson, Aaron D.; Sturniolo, Emil; Menn, Anatoly; Olson, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  271. Hanson,Aaron D.; Sturniolo,Emil A.; Menn,Anatoly; Olson,Erik D.; Savarese,Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  272. Hanson,Aaron D.; Sturniolo,Emil A.; Menn,Anatoly; Olson,Erik D.; Savarese,Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  273. Sturniolo, Emil A.; Savarese, Joseph T.; Olson, Erik; Thompson, Dave; Jackson, Michael; Renouard, Julia, Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  274. Sturniolo, Emil; Stavens, Aaron; Savarese, Joseph, Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments.
  275. Higley DeeAnne Barker ; Thorne Bruce Warner ; Jarvis Brian Lee, Method and apparatus for proxy authentication.
  276. Burns, Lawrence M.; Ramachandran, Ravi, Method and apparatus for reflective mixer testing of a cable modem.
  277. Lum, Clinton Edward, Method and apparatus for remote installation of network drivers and software.
  278. Lum,Clinton Edward, Method and apparatus for remote installation of network drivers and software.
  279. Bellovin Steven Michael ; Cheswick William Roberts, Method and apparatus for restricting access to private information in domain name systems by filtering information.
  280. Bellovin Steven Michael ; Cheswick William Roberts, Method and apparatus for restricting access to private information in domain name systems by redirecting query requests.
  281. Schmidt Thomas J. ; Huppert Larry ; Ben-Michael Simoni,ILX ; Ben-Nun Michael,ILX, Method and apparatus for secure remote wake-up of a computer over a network.
  282. Brantley W. Coile ; Richard A. Howes ; William M. LeBlanc, Method and apparatus for transparently proxying a connection.
  283. Coile, Brantley W.; Howes, Richard A.; LeBlanc, William M., Method and apparatus for transparently proxying a connection.
  284. Coile,Brantley W.; Howes,Richard A.; LeBlanc,William M., Method and apparatus for transparently proxying a connection.
  285. Hammarstrom Peter,SEX ; Lindeberg Jan H. I.,DKX ; Smidt Allan,DKX, Method and arrangement for integrating intelligent network services with operator assisted services.
  286. Anderson Mark Stephen,AUX ; Griffin John Edmund,AUX ; North Christopher James Guildford,AUX ; Yesberg John Desborough,AUX ; Yiu Kenneth Kwok-Hei,AUX ; Milner Robert Brunyee,AUX, Method and means for interconnecting different security level networks.
  287. Shulman, Amichai; Shatz, Gur; Yellin, Ido, Method and security system for indentifying and blocking web attacks by enforcing read-only parameters.
  288. Fijolek John G. ; Beser Nurettin B. ; Robinson Philip T., Method and system for addressing network host interfaces from a cable modem using DHCP.
  289. Arutyunov, Yuri, Method and system for automatic link hang up.
  290. Cohn, Alan Wade; Battles, Ronald E.; Proft, David; Shumate, Scott William, Method and system for automatically providing alternate network access for telecommunications.
  291. Beser Nurettin B., Method and system for bundling data in a data-over-cable system.
  292. Beser Nurettin B., Method and system for cable modem initialization using dynamic servers.
  293. Fijolek John G. ; Beser Nurettin B., Method and system for cable modem management of a data-over-cable system.
  294. Zobel, Robert David; Dodd, Timothy David; Millar, Sharon A.; Nesfeder, Jr., David Gerald; Singer, Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  295. Zobel,Robert David; Dodd,Timothy David; Millar,Sharon A.; Nesfeder, Jr.,David Gerald; Singer,Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  296. Turley, Patrick; Johnston, Keith; Tonnesen, Steven D., Method and system for controlling network access.
  297. Hammer, John M.; Ge, Rixin; Burke, Charles D.; Hubbard, Charles, Method and system for creating a record for one or more computer security incidents.
  298. Motoyama,Tetsuro, Method and system for diagnosis and control of machines using connection and connectionless modes of communication.
  299. Fijolek,John G.; Akgun,Ali; Shammas,Rita; Harper,Matthew, Method and system for dynamic service registration in a data-over-cable system.
  300. Roegner, Michael W., Method and system for dynamically implementing an enterprise resource policy.
  301. Nahm, Kitae; Trujillo, Juan Carlos; Lee, Shiang-feng, Method and system for electronic device authentication.
  302. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Method and system for establishing a security perimeter in computer networks.
  303. Raanan Gil,ILX ; Moran Tal,ILX ; Galant Yoron ; El-Hanani Yuval,ILX ; Reshef Eran, Method and system for extracting application protocol characteristics.
  304. Raanan, Gil; Moran, Tal; Galant, Yaron; El-Hanani, Yuval; Reshef, Eran, Method and system for extracting application protocol characteristics.
  305. Caronni, Germano; Gupta, Amit; Markson, Tom R.; Kumar, Sandeep; Schuba, Christoph L.; Scott, Glenn C., Method and system for facilitating relocation of devices on a network.
  306. Dodd, Timothy D.; Mewett, Scott; Ide, Curtis E.; Overcash, Kevin A.; Dennerline, David A.; Williams, Bobby J.; Sells, Martin D., Method and system for identifying, fixing, and updating security vulnerabilities.
  307. Hackenberger, William Frank; Hendry, Randy Jay; Wood, Christopher James, Method and system for implementing security devices in a network.
  308. Fijolek,John G.; Gilbert,Irene; Kulkarni,Jaideep, Method and system for integrating IP address reservations with policy provisioning.
  309. Kennis, Peter H., Method and system for intrusion detection in a computer network.
  310. Cohn, Alan Wade; Faulkner, Gary Robert; Kitchen, James Edward; Proft, David Leon; Quain, Corey Wayne, Method and system for logging security event data.
  311. Luna, Michael; Tervahauta, Mikko; Pan, Yixin, Method and system for management of a virtual network connection without heartbeat messages.
  312. Fijolek John G. ; Beser Nurettin B., Method and system for managing addresses for network host interfaces in a data-over-cable system.
  313. Farley,Timothy P.; Hammer,John M.; Williams,Bryan Douglas; Brass,Philip Charles; Young,George C.; Mezack,Derek John, Method and system for managing computer security information.
  314. Elliott, Isaac; Steele, Rick; Verlare, Jim, Method and system for multi-media collaboration between remote parties.
  315. Malan, Gerald R.; Jahanian, Farnam, Method and system for profiling network flows at a measurement point within a computer network.
  316. Palmer, Jr., Bernard Paul; Graham, Robert David, Method and system for protecting computer networks by altering unwanted network data traffic.
  317. Reshef Eran,ILX ; Raanan Gil,ILX ; Solan Eilon,ILX, Method and system for protecting operations of trusted internal networks.
  318. Giroir,Didier; Hericourt,Olivier, Method and system for providing SNA access to telnet 3270 and telnet 3270 enhanced services over wide area networks.
  319. Cohn, Alan Wade; Battles, Ronald E.; Proft, David; Shumate, Scott William, Method and system for providing alternate network access.
  320. Fijolek, John G.; Beser, Nurettin B., Method and system for providing quality-of-service in a data-over-cable system.
  321. Fijolek John G. ; Beser Nurettin B., Method and system for providing quality-of-service in a data-over-cable system using configuration protocol messaging.
  322. Shaath, Kamel, Method and system for providing restricted access to a storage medium.
  323. Shaath, Kamel, Method and system for providing restricted access to a storage medium.
  324. Shaath, Kamel, Method and system for providing restricted access to a storage medium.
  325. Cain Michael Eugene, Method and system for providing secured access to a server connected to a private computer network.
  326. Akgun, Ali; Fijolek, John G.; Sangston, Steven W.; Beser, Nurettin B., Method and system for provisioning network addresses in a data-over-cable system.
  327. Nurettin B. Beser, Method and system for quality-of-service based data forwarding in a data-over-cable system.
  328. Chmielewski Paul Richard ; Murphy ; Jr. Thomas Edwin ; Rieth Paul Francis ; Stevens Jeffrey Scott, Method and system for recovering system resources used by an inactive Telnet client.
  329. Chmielewski Paul Richard ; Murphy ; Jr. Thomas Edwin ; Rieth Paul Francis ; Stevens Jeffrey Scott, Method and system for recovering system resources used by an inactive Telnet client.
  330. Slavin, Sean; Cook, Jay S.; El-Sabaaly, Hatem K., Method and system for remote control of a local system.
  331. Slavin,Sean; Cook,Jay S.; El Sabaaly,Hatem K., Method and system for remote control of a local system.
  332. Beser Nurettin B. ; Fijolek John G. ; Robinson Philip T., Method and system for resolving addresses for network host interfaces from a cable modem.
  333. Beser, Nurettin B., Method and system for seamless address allocation in a data-over-cable system.
  334. Beser Nurettin B., Method and system for secure cable modem initialization.
  335. Beser Nurettin B., Method and system for secure cable modem registration.
  336. Roegner, Michael W., Method and system for selecting advertisements to be presented to a viewer.
  337. Roegner, Michael W., Method and system for selecting content items to be presented to a viewer.
  338. Beser Nurettin B., Method and system for setting and managing externally provided internet protocol addresses using the dynamic host configuration protocol.
  339. Goldman Jonathan (Menlo Park CA) Saperstein Garry (Sunnyvale CA), Method and system for user authorization over a multi-user computer system.
  340. Moran,Tal; El Hanani,Yuval; Raanan,Gil; Reshef,Eran, Method and system for verifying a client request.
  341. Fijolek, John G.; Beser, Nurettin B.; Robinson, Philip T.; Gun, Levent, Method and system for virtual network administration with a data-over cable system.
  342. Gannon Mark Alan ; Barnea Michael ; Kirson Allan M., Method for a vehicular gateway to transport information, including a method for programming the gateway.
  343. Low, Colin; Seaborne, Andrew Franklin; Bouthors, Nicolas, Method for accessing service resource items that are for use in a telecommunications system.
  344. Low, Colin; Seaborne, Andrew Franklin; Bouthors, Nicolas, Method for accessing service resource items that are for use in a telecommunications system.
  345. Nurettin B. Beser, Method for addressing of passive network hosts in a data-over-cable system.
  346. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for authenticating a user access request.
  347. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for authenticating a user access request.
  348. Beser Nurettin B., Method for authentication of network devices in a data-over cable system.
  349. Unger Jay ; Leone Paul ; Gegen Pete ; Rauch Thyra, Method for automatically constructing contexts in a hypertext collection.
  350. Cox, Dennis; McClanahan, Kip, Method for blocking denial of service and address spoofing attacks on a private network.
  351. Cox, Dennis; McClanahan, Kip, Method for blocking denial of service and address spoofing attacks on a private network.
  352. Beser, Nurettin B.; Fijolek, John G., Method for changing type-of-service in a data-over-cable system.
  353. Truong, Steve H., Method for checkpointing and reconstructing separated but interrelated data.
  354. Lita,Christian; Vepstas,Linas, Method for client delegation of security to a proxy.
  355. Fruchtman,Barry, Method for controlling client access.
  356. Vogel, Mark O., Method for detecting radio frequency impairments in a data-over-cable system.
  357. Vogel,Mark O., Method for dynamic performance optimization in a data-over-cable system.
  358. Nadalin,Anthony J.; Rich,Bruce Arland; Shrader,Theodore Jack London, Method for enabling a program written in untrusted code to interact with a security subsystem of a hosting operating system.
  359. Michael Bradford Ault ; Garry L. Child ; Ernst Robert Plassmann ; Bruce Arland Rich ; Theodore Jack London Shrader ; Davis Kent Soper, Method for enabling a web server running a "closed" native operating system to impersonate a user of a web client to obtain a protected file.
  360. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  361. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  362. Larson, Victor; Short, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing encrypted channel.
  363. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  364. Ault Michael Bradford ; Child Garry L. ; Plassmann Ernst Robert ; Rich Bruce Arland ; Shrader Theodore Jack London ; Soper Davis Kent, Method for executing a user-requested CGI program in a new authentication context while protecting operation of a default web server program.
  365. Vogel,Mark O.; Robinson,Philip T., Method for improved cable modem ranging in a data-over-cable system.
  366. Beser, Nurettin B.; Fijolek, John G., Method for network address table maintenance in a data-over-cable system using a network device registration procedure.
  367. Beser, Nurettin B.; Fijolek, John G., Method for network address table maintenance in a data-over-cable system using destination reachibility.
  368. Aravamudan Murali ; Tzeng Hong-Yi, Method for network address translation.
  369. Ruszczyk, Chester A.; Willming, David, Method for reducing interference from initializing network devices in a data-over-cable system.
  370. Chan Nai Tiong SG, Method for security partitioning of a computer system.
  371. Ben Itzhak, Yuval, Method for the automatic setting and updating of a security policy.
  372. Toga James E., Method for transferring data between a network of computers dynamically based on tag information.
  373. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for transparently managing outbound traffic from an internal user of a private network destined for a public network.
  374. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Method for updating personal financial information on a web site.
  375. Vogel, Mark O., Method for using an initial maintenance opportunity for non-contention ranging.
  376. Tatsuya Fujiyama JP; Makoto Kayashima JP; Masato Terada JP; Osamu Katsumata JP, Method of collectively managing dispersive log, network system and relay computer for use in the same.
  377. Fruchtman, Barry, Method, system and article of manufacture for controlling client access.
  378. Marcotte, Scott Thomas, Method, system and program product for managing the flow of data between senders and receivers of a computing environment.
  379. Coss,Michael John; Majette,David L.; Sharp,Ronald L., Methods and apparatus for a computer network firewall with multiple domain support.
  380. Coss Michael John ; Majette David L. ; Sharp Ronald L., Methods and apparatus for a computer network firewall with proxy reflection.
  381. Maurice W. Haff ; Christopher D. Clarke, Methods and apparatus for secure electronic, certified, restricted delivery mail systems.
  382. Balabine, Igor, Methods and apparatus for securing access to a computer.
  383. Van Der Merwe, Jacobus; Gerber, Alexandre; Ramakrishnan, Kadangode, Methods and apparatus to communicatively couple virtual private networks to virtual machines within distributive computing networks.
  384. Baliga, Arati; Chen, Xu; Coskun, Baris; de los Reyes, Gustavo; Lee, Seungjoon; Mathur, Suhas; Van der Merwe, Jacobus; Xu, Gang, Methods and apparatus to configure virtual private mobile networks for security.
  385. Baliga, Arati; Chen, Xu; Coskun, Baris; de los Reyes, Gustavo; Lee, Seungjoon; Mathur, Suhas; Van der Merwe, Jacobus; Xu, Gang, Methods and apparatus to configure virtual private mobile networks for security.
  386. Van der Merwe, Jacobus; Chen, Xu; Coskun, Baris; de los Reyes, Gustavo; Lee, Seungjoon; Mathur, Suhas; Baliga, Arati; Xu, Gang, Methods and apparatus to configure virtual private mobile networks to reduce latency.
  387. Van der Merwe, Jacobus; Baliga, Arati; Chen, Xu; Coskun, Baris; de los Reyes, Gustavo; Lee, Seungjoon; Mathur, Suhas; Xu, Gang, Methods and apparatus to configure virtual private mobile networks with virtual private networks.
  388. Gerber, Alexandre; Lund, Carsten; Van der Merwe, Jacobus; Satterlee, Michael, Methods and apparatus to dynamically control access from virtual private networks to network-based shared resources.
  389. Satterlee, Michael; Shackleton, Neal; Gibbons, John F., Methods and apparatus to dynamically control connectivity within virtual private networks.
  390. Satterlee, Michael; Shackleton, Neal; Gibbons, John F., Methods and apparatus to dynamically control connectivity within virtual private networks.
  391. Satterlee, Michael; Shackleton, Neal; Gibbons, John F., Methods and apparatus to dynamically control connectivity within virtual private networks.
  392. Satterlee, Michael; Shackleton, Neal; Gibbons, John F., Methods and apparatus to dynamically control connectivity within virtual private networks.
  393. Ramakrishnan, Kadangode K.; Van Der Merwe, Jacobus; Shenoy, Prashant; Wood, Timothy, Methods and apparatus to migrate virtual machines between distributive computing networks across a wide area network.
  394. Ramakrishnan, Kadangode K.; Van der Merwe, Jacobus E.; Shenoy, Prashant; Wood, Timothy, Methods and apparatus to migrate virtual machines between distributive computing networks across a wide area network.
  395. Raji, Reza; Gutt, Gerald, Methods and systems for improved system performance.
  396. Raji, Reza; Gutt, Gerald, Methods and systems for improved system performance.
  397. Ryan W. J. Waite ; Bruno Lambert, Methods and systems for securely delivering electronic mail to hosts having dynamic IP addresses.
  398. Fijolek, John G.; Robinson, Phillip T.; Gilbert, Irene M.; Budinger, Daniel M.; Jain, Narij, Methods and systems for service level agreement enforcement on a data-over cable system.
  399. Perlmutter, Amnon; Waisman, Benzi, Methods for intelligent NIC bonding and load-balancing.
  400. Perlmutter, Amnon; Waisman, Benzi, Methods for intelligent NIC bonding and load-balancing.
  401. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security for ad hoc networked computerized devices.
  402. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security over untrusted networks.
  403. John G. Fijolek ; Levent Gun ; Ronald B. Lee ; Philip T. Robinson, Methods for restricting access of network devices to subscription services in a data-over-cable system.
  404. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods of operating a portable communications device with enhanced security.
  405. Holden,James M.; Levin,Stephen E.; Nickel,James O.; Wrench,Edwin H., Methods of operating portable computerized device with network security.
  406. Corthell David, Methods, software, and apparatus for secure communication over a computer network.
  407. Dargis, Anthony B., Methods, systems, and computer program products for access control services using a transparent firewall in conjunction with an authentication server.
  408. Norton, Stephen Pancoast; Burchfield, Chris; Frataccia, Rick J.; Gibson, Sr., Gary O; Prince, David, Methods, systems, and products for intrusion detection.
  409. Holden, James M.; Levin, Stephen E.; Snow, David W.; Snow, legal representative, Mary; Wrench, Edwin H., Mixed enclave operation in a computer network.
  410. Luna, Michael, Mobile application traffic optimization.
  411. Luna, Michael; Ylinen, Heikki; Salorinne, Seppo, Mobile application traffic optimization.
  412. Luna, Michael, Mobile device and method to utilize the failover mechanism for fault tolerance provided for mobile traffic management and network/device resource conservation.
  413. Fiatal, Trevor, Mobile device configured for communicating with another mobile device associated with an associated user.
  414. Alisawi, Rami, Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network.
  415. Luna, Michael, Mobile device having content caching mechanisms integrated with a network operator for traffic alleviation in a wireless network and methods therefor.
  416. Fiatal, Trevor A.; Boynton, Lee R.; Burke, Scott M.; Gustafson, Brian D.; Raj, Binu; Alvarado, William; Benitez, Juan; Duncan, Fred J., Mobile device power management in data synchronization over a mobile network with or without a trigger notification.
  417. Ismail, Mohanad; Wendling, Michael; Backholm, Ari, Mobile device with application or context aware fast dormancy.
  418. Luna, Michael; Tervahauta, Mikko, Mobile network background traffic data management.
  419. Luna, Michael; Tervahauta, Mikko, Mobile network background traffic data management with optimized polling intervals.
  420. Backholm, Ari; Bott, Ross; Luna, Michael, Mobile network reporting and usage analytics system and method aggregated using a distributed traffic optimization system.
  421. Backholm, Ari; Luna, Michael; Ylinen, Heikki, Mobile network traffic coordination across multiple applications.
  422. Luna, Michael, Mobile network traffic coordination across multiple applications.
  423. Sturniolo, Emil A.; Savarese, Joseph T.; Olson, Erik; Patashnik, Eli, Mobile networking system and method using IPv4 and IPv6.
  424. Luna, Michael; Backholm, Ari, Mobile traffic categorization and policy for network use optimization while preserving user experience.
  425. Fiatal, Trevor, Mobile virtual network operator.
  426. Fiatal, Trevor, Mobile virtual network operator.
  427. Wesinger, Jr., Ralph E.; Coley, Christopher D., Modular multi-homed web server with animation player.
  428. Wesinger, Jr., Ralph E.; Coley, Christopher D., Modular multi-homed web server with compiled animation server.
  429. Ogram Mark E., Monitoring and regulatory system for the internet.
  430. Luna, Michael; Bott, Ross, Monitoring mobile application activities for malicious traffic on a mobile device.
  431. Wesinger, Jr., Ralph E.; Coley, Christopher D., Multi-homed web server.
  432. Wesinger, Jr., Ralph E.; Coley, Christopher D., Multi-homed web server with animation player.
  433. Wesinger, Jr., Ralph E.; Coley, Christopher D., Multi-homed web server with animation player and programmable functionality.
  434. Wesinger, Jr., Ralph E.; Coley, Christopher D., Multi-homed web server with compiled animation server.
  435. Wesinger, Jr., Ralph E.; Coley, Christopher D., Multi-homed web server with compiled animation server and programmable functionality.
  436. Williams Timothy C., Multi-level security network system.
  437. Williams,Timothy C., Multi-level security network system.
  438. Allen D. Kaplan ; William F. McCarthy, Multi-protocol communications routing optimization.
  439. Allen D. Kaplan ; William F. McCarthy, Multi-protocol telecommunications routing optimization.
  440. Kaplan, Allen D.; McCarthy, William F., Multi-protocol telecommunications routing optimization.
  441. Kaplan, Allen D.; McCarthy, William F., Multi-protocol telecommunications routing optimization.
  442. Kaplan,Allen D.; McCarthy,William F., Multi-protocol telecommunications routing optimization.
  443. Carol Y. Devine ; Tammy E. Dollar ; Wayne J. Munguia, Multi-threaded web based user inbox for report management.
  444. Sutaria, Jay; Gustafson, Brian Daniel; van Gent, Robert Paul; Lin, Ruth; Merriwether, David; Sawhney, Parvinder, Multiple data store authentication.
  445. Kenworthy, Stacy, Network attached device with dedicated firewall security.
  446. Kenworthy, Stacy, Network attached device with dedicated firewall security.
  447. Kitai, Katsuyoshi; Masuoka, Yoshimasa; Yoshizawa, Satoshi; Maciel, Frederico Buchholz; Tarui, Toshiaki; Higuchi, Tatsuo; Murahashi, Hideki, Network data communication system.
  448. Bahr Terry S., Network distributed system for updating locally secured objects in client machines.
  449. Wiegel Scott L., Network gateway mechanism having a protocol stack proxy.
  450. Friedman Aharon ; Bozoki Eva, Network security device.
  451. Voit, Eric A.; Balkovich, Edward E.; Goodman, William D.; Gadre, Jayant G.; White, Patrick E.; Young, David E., Network session management for telephony over hybrid networks.
  452. Voit, Eric A.; Balkovich, Edward E.; Goodman, William D.; Gadre, Jayant G.; White, Patrick E.; Young, David E., Network session management for telephony over hybrid networks.
  453. Kimura, Shinya; Sasaki, Takahiro; Nakade, Motoki; Kunito, Yoshiyuki; Hokimoto, Akihiro; Oka, Makoto; Matsuyama, Shinako; Shionozaki, Atsushi, Network system.
  454. Kimura, Shinya; Sasaki, Takahiro; Nakade, Motoki; Kunito, Yoshiyuki; Hokimoto, Akihiro; Oka, Makoto; Matsuyama, Shinako; Shionozaki, Atsushi, Network system.
  455. Kimura, Shinya; Sasaki, Takahiro; Nakade, Motoki; Kunito, Yoshiyuki; Hokimoto, Akihiro; Oka, Makoto; Matsuyama, Shinako; Shionozaki, Atsushi, Network system.
  456. Backholm, Ari, Network-initiated data transfer in a mobile network.
  457. Graveline, Marc; Roy, Patrick; Viney, Ulf, Opaque cryptographic web application data protection.
  458. Bott, Ross; Luna, Michael, Operation modes for mobile traffic optimization and concurrent management of optimized and non-optimized traffic.
  459. Luna, Michael, Optimization of mobile traffic directed to private networks and operator configurability thereof.
  460. Luna, Michael; Campbell, Stan, Optimization of resource polling intervals to satisfy mobile device requests.
  461. Wendling, Michael; Kokhanovskyi, Andrii; Backholm, Ari; Bott, Ross, Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion.
  462. Jade Prashanth ; Moore Victor Stuart ; Rao Arun Mohan ; Walters Glen Robert, Outside access to computer resources through a firewall.
  463. Farris, Robert D.; Voit, Eric A., Packet data network voice call quality monitoring.
  464. Shanklin, Steven D.; Lathem, Gerald S., Parallel intrusion detection sensors with load balancing for high speed networks.
  465. Shanklin, Steven D.; Lathem, Gerald S., Parallel intrusion detection sensors with load balancing for high speed networks.
  466. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Persistent and reliable session securely traversing network components using an encapsulating protocol.
  467. Fiatal, Trevor, Policy based content service.
  468. Fiatal, Trevor, Polling.
  469. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Portable communications device with enhanced security.
  470. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Portable computerized device with network security.
  471. Siegel, Steven A.; Zwarico, Amy; Pearson, Larry B., Pre-delivery authentication.
  472. Siegel, Steven A.; Zwarico, Amy; Pearson, Larry B., Pre-delivery authentication.
  473. Edward Robert Segal, Precomputed and distributed security system for a communication network.
  474. Fiatal, Trevor, Predictive content delivery.
  475. Hesselink, Lambertus; Rizal, Dharmarus; van Beurden, Joep; Bjornson, Eric S., Program recording webification.
  476. Backholm, Ari, Provisioning applications for a mobile device.
  477. Backholm, Ari, Provisioning applications for a mobile device.
  478. Backholm, Ari; Salorinne, Seppo; Heinonen, Jussi; Ketonen, Marko; Vuornos, Lauri, Provisioning of e-mail settings for a mobile terminal.
  479. Backholm, Ari; Salorinne, Seppo; Heinonen, Jussi; Ketonen, Marko; Vuornos, Lauri, Provisioning of e-mail settings for a mobile terminal.
  480. Alisawi, Rami, Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network.
  481. Baugher Mark J. ; Dhesikan Subha ; Patki Ema Y., Proxy-based reservation of network resources.
  482. Todd, Stephen James Paul; Ayres, Malcolm David; Holloway, Timothy Nicholas; Holdsworth, Simon Anthony James; Schmidt, Marc-Thomas; Taylor, Michael George, Publish/subscribe data processing with subscription points for customized message processing.
  483. van Gent, Robert Paul; Ariel, Ido, Publishing data in an information community.
  484. Backholm, Ari; Luna, Michael; Pan, Yixin, Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol.
  485. Backholm, Ari; Luna, Michael; Pan, Yixin, Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol.
  486. Saito,Takeshi; Takabatake,Yoshiaki, Relay device and communication device realizing contents protection procedure over networks.
  487. Terada, Masato; Kayashima, Makoto; Kawashima, Takahiko; Fujiyama, Tetsuya; Koizumi, Minoru; Nishimura, Kazuo; Hirayama, Kazunari; Ogino, Takaaki, Repeater and network system utililzing the same.
  488. Terada Masato,JPX ; Kayashima Makoto,JPX ; Kawashima Takahiko,JPX ; Fujiyama Tetsuya,JPX ; Koizumi Minoru,JPX ; Nishimura Kazuo,JPX ; Hirayama Kazunari,JPX ; Ogino Takaaki,JPX, Repeater and network system utilizing the same.
  489. Luna, Michael; Tsõmbaljuk, Andrei, Request and response characteristics based adaptation of distributed caching in a mobile network.
  490. Bhatt, Yogesh; Chang, Jue; Shanbhag, Vyankatesh, Resource aware session adaptation system and method for enhancing network throughput.
  491. Ando,Tatsuhiro; Kamo,Toshiyuki, Router and IP-packet-transferring method.
  492. Ashdown Mike ; Lynchard Steve, SS7 firewall system.
  493. Zaborovsky,Vladimir S.; Kupreenko,Sergey V.; Shemanin,Yuri A., Secure computer network with a network screen.
  494. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure customer interface for Web based data management.
  495. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure customer interface for web based data management.
  496. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure customer interface for web based data management.
  497. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure customer interface for web based data management.
  498. Boynton, Lee R.; Fiatal, Trevor A.; Burke, Scott M.; Sikes, Mark, Secure end-to-end transport through intermediary nodes.
  499. Boynton, Lee R.; Fiatal, Trevor A.; Burke, Scott M.; Sikes, Mark, Secure end-to-end transport through intermediary nodes.
  500. Minear Spence ; Stockwell Edward B. ; de Jongh Troy, Secure firewall supporting different levels of authentication based on address or encryption status.
  501. Magdych, James S.; Rahmanovic, Tarik; McDonald, John R.; Tellier, Brock E.; Osborne, Anthony C.; Herath, Nishad P., Secure gateway for analyzing textual content to identify a harmful impact on computer systems with known vulnerabilities.
  502. Underwood, Roy Aaron, Secure gateway interconnection in an e-commerce based environment.
  503. Magdych, James S.; Rahmanovic, Tarik; McDonald, John R.; Tellier, Brock E.; Osborne, Anthony C.; Herath, Nishad P., Secure gateway with firewall and intrusion detection capabilities.
  504. Morlando, Salvatore, Secure interface for a mobile communications device.
  505. Cianfrocca Francis ; Sohn Adam H., Secure middleware and server control system for querying through a network firewall.
  506. Nemoto Kazuo,JPX, Secure network authentication server via dedicated serial communication path.
  507. Green Michael W. ; Kruse Ricky Ronald, Secure network proxy for connecting entities.
  508. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for Web based data management.
  509. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for web based data management.
  510. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for web based data management.
  511. Devine,Carol Y; Shifrin,Gerald A; Shoulberg,Richard W, Secure server architecture for web based data management.
  512. Green Michael W. ; Jensen Andrew W., Secure server utilizing separate protocol stacks.
  513. Green Michael W. ; Jensen Andrew W., Secure server utilizing separate protocol stacks.
  514. Boynton, Lee R.; Fiatal, Trevor A.; Burke, Scott M.; Sikes, Mark, Secure transport for mobile communication network.
  515. Boynton,Lee R.; Fiatal,Trevor A.; Burke,Scott M.; Sikes,Mark, Secure transport for mobile communication network.
  516. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay, Secure traversal of network components.
  517. Birrell Andrew D. ; Wobber Edward P. ; Abadi Martin ; Stata Raymond P., Secure web tunnel.
  518. Yarborough,William Jordan, Secured FTP architecture.
  519. Gore ; Jr. Robert Cecil ; Haugh ; II John Frederick, Secured gateway interface.
  520. Baum, Marc; Dawes, Paul J.; Kinney, Mike; Raji, Reza; Swenson, David; Wood, Aaron, Security network integrated with premise security system.
  521. Watson,Mark; Sharp,Iain, Security over a network.
  522. Mayo,Mary Ann; Neemann,Trey; Pearson,Harry; Sekhar,Chandra C.; Toraason,Dan, Security session authentication system and method.
  523. Teixeira, Steven L.; Carr, Christopher, Security system and methodology for providing indirect access control.
  524. Mayes John C. ; Coile Brantley W., Security system for network address translation systems.
  525. Mayes, John C.; Coile, Brantley W., Security system for network address translation systems.
  526. Mayes, John C.; Coile, Brantley W., Security system for network address translation systems.
  527. Mayes,John C.; Coile,Brantley W., Security system for network address translation systems.
  528. Herrmann, Conrad K., Security system providing methodology for cooperative enforcement of security policies during SSL sessions.
  529. Bentley,Joseph, Security system with methodology for computing unique security signature for executable file employed across different machines.
  530. Linetsky, Gene, Security system with methodology for defending against security breaches of peripheral devices.
  531. Freund, Gregor P., Security system with methodology for interprocess communication control.
  532. Freund, Gregor Paul, Security system with methodology providing verified secured individual end points.
  533. Dawes, Paul J.; Fulker, Jim; Wales, Carolyn, Security system with networked touchscreen.
  534. Dawes, Paul J., Security system with networked touchscreen and gateway.
  535. Cohn, Alan Wade; Dearman, Lewis Clay; Faulkner, Gary Robert; Johnson, James A.; Kitchen, James Edward; Proft, David Leon, Security, monitoring and automation controller access and use of legacy security control panel information.
  536. Haff, Maurice W.; Clarke, Christopher D., Selective acceptance of electronic messages in communication systems.
  537. Luna, Michael, Selective data compression by a distributed traffic management system to reduce mobile data traffic and signaling traffic.
  538. Larkins John P., Setup of new subscriber radiotelephone service using the internet.
  539. Sjodin Staffan,SEX, Signaling channel firewall for communications between wireless networks.
  540. Backholm, Ari, Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols.
  541. Kikinis Dan, Simulcast WEB page delivery using a 3D user interface system.
  542. Kikinis, Dan, Simulcast web page delivery.
  543. Kikinis, Dan, Simulcast web page delivery.
  544. Kikinis, Dan, Simulcast web page delivery.
  545. Kikinis,Dan, Simulcast web page delivery.
  546. Ghostine, Peter E.; McDonald, Michael, Single sign-on system for shared resource environments.
  547. Ghostine, Peter E.; McDonald, Michael, Single sign-on system for shared resource environments.
  548. Ebrahimi, Hashem Mohammad; Rupp, Bradley W; Oyler, Mel J., Single sign-on with basic authentication for a transparent proxy.
  549. Luna, Michael; Bott, Ross, Social caching for device resource sharing and management.
  550. Poder, James, Stateful home phone service.
  551. Braddy Ricky Gene, System and architecture for distributing, monitoring, and managing information requests on a computer network.
  552. Braddy Ricky Gene, System and architecture for distributing, monitoring, and managing information requests on a computer network.
  553. Fruchtman, Barry, System and article of manufacture for controlling client access.
  554. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  555. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  556. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  557. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  558. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  559. Elliott, Isaac K.; Krishnawswamy, Sridhar, System and method for a directory service supporting a hybrid communication system architecture.
  560. Luna, Michael; Bott, Ross, System and method for a mobile device to use physical storage of another device for caching.
  561. Luna, Michael; Bott, Ross, System and method for a mobile device to use physical storage of another device for caching.
  562. Voldman,Mikhail; Budinger,Dan; Akgun,Ali; Fijolek,John G.; Vogel,Mark O.; Kelkar,Kris, System and method for a multi-frequency upstream channel in a computer network.
  563. Necka, William; Fey, Igor; Akgun, Ali; Arutyunov, Yuri, System and method for a specialized dynamic host configuration protocol proxy in a data-over-cable network.
  564. Tighe,James R.; Higgins,Ronald D.; Platt,Richard B.; Bell,Robert T., System and method for a virtual telephony intermediary.
  565. Gwertzman James ; McDaniel William Paul Allan, System and method for accessing user properties from multiple storage mechanisms.
  566. Gooderum Mark P. ; Vu Trinh Q. ; Andreas Glenn, System and method for achieving network separation.
  567. Gooderum Mark P. ; Vu Trinh Q. ; Andreas Glenn, System and method for achieving network separation.
  568. Jakobson, Gabriel, System and method for alerting on open file-share sessions on a user's electronic device.
  569. Karadogan, Baris; Lee, Ronald, System and method for assigning dynamic host configuration protocol parameters in devices using resident network interfaces.
  570. Pagan, Florence C. I.; Short, Joel E., System and method for authorizing a portable communication device.
  571. Willming,David; Chan,Paul; Necka,William; Lee,Ronald, System and method for automatic digital certificate installation on a network device in a data-over-cable system.
  572. Fijolek,John G.; Gilbert,Irene; Akgun,Ali; Khan,Shahidur; Swamy,Vikram, System and method for automatic load balancing in a data-over-cable network.
  573. Brysch, Michael; Heilmann, Craig; Pickens, Keith S.; Applonie, Robert R., System and method for bringing an in-line device on-line and assuming control of calls.
  574. Del Sol, Timothy; Krishnamurthy, Gopalan, System and method for calibrating power level during initial ranging of a network client device.
  575. Dulman Scott, System and method for changing advanced intelligent network services from customer premises equipment.
  576. Karadogan Baris ; Nunns Andrew ; Robinson Philip Thomas, System and method for communicating with a telco-return cable modem as a single communications device.
  577. Seeber,Ren챕, System and method for compiling images from a database and comparing the compiled images with known images.
  578. Seeber,Ren��, System and method for compiling images from a database and comparing the compiled images with known images.
  579. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for computer security.
  580. Remer, Eric B.; King, David A.; Remer, David L., System and method for connecting to a device on a protected network.
  581. Chong, Lester J; Makaijani, Michael; Cheline, Douglas, System and method for content filtering.
  582. Richard R. Viets ; David G. Motes ; Paula Budig Greve ; Wayne W. Herberg, System and method for controlling access to documents stored on an internal network.
  583. Viets, Richard R.; Motes, David G.; Greve, Paula Budig; Herberg, Wayne W., System and method for controlling access to documents stored on an internal network.
  584. Viets, Richard R.; Motes, David G.; Greve, Paula Budig; Herberg, Wayne W., System and method for controlling access to documents stored on an internal network.
  585. Reid Irving,CAX ; Minear Spencer, System and method for controlling interactions between networks.
  586. Sharp, Clifford F.; Dark, Susan P., System and method for detecting and eliminating IP spoofing in a data transmission network.
  587. Sharp,Clifford F.; Dark,Susan Pittman, System and method for detecting and eliminating IP spoofing in a data transmission network.
  588. Johnston, Keith; White, Eric; Martin, John, System and method for double-capture/double-redirect to a different location.
  589. Ta, Tuan; Turley, Patrick; Clendinning, Kerry; Looney, Kelly, System and method for dynamic bandwidth provisioning.
  590. Ta, Tuan; Turley, Patrick; Clendinning, Kerry; Looney, Kelly, System and method for dynamic bandwidth provisioning.
  591. Pearce,Christopher E.; Whetten,Delon R.; Michalewicz,Larry G., System and method for enabling multicast telecommunications.
  592. Caronni, Germano; Gupta, Amit; Kumar, Sandeep; Markson, Tom R.; Schuba, Christoph L.; Scott, Glenn C., System and method for enabling scalable security in a virtual private network.
  593. Riggins,Mark D., System and method for enabling secure access to services in a computer network.
  594. Riggins,Mark D., System and method for encrypting and decrypting files.
  595. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing a communication link.
  596. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing an encrypted communication link based on IP address lookup requests.
  597. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  598. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  599. Fleming, Michael, System and method for executing commands that are non-native to the native environment of a mobile device.
  600. Beser Nurettin B. ; Fijolek John G., System and method for extending communications features using generic management information base objects.
  601. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for generating fictitious content for a computer.
  602. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  603. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  604. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  605. Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Bui,Hong Q.; Ng,Mason; Quinlan,Sean Michael; Ying,Christine C.; Zuleeg,Christopher R.; Cowan,David J.; Aptekar Strober,Joanna A.; Bailes,R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  606. Andrew Flint CA; Irving Reid CA; Gene Amdur CA, System and method for implementing a security policy.
  607. Riggins Mark D., System and method for installing and using a temporary certificate at a remote site.
  608. Lee,Ronald B., System and method for insuring dynamic host configuration protocol operation by a host connected to a data network.
  609. Luna, Michael, System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief.
  610. Luna, Michael, System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief.
  611. Fijolek, John G.; Beser, Nurettin B., System and method for managing channel usage in a data over cable system.
  612. Jackson, Eric S.; Song, Douglas J.; Fleis, Lawrence Benjamin; Dysart, Aidan Christopher; Malan, Gerald R., System and method for managing computer networks.
  613. Jackson,Eric S; Song,Douglas J; Fleis,Lawrence Benjamin; Dysart,Aidan Christopher; Malan,Gerald R, System and method for managing computer networks.
  614. Yang, Xuechen, System and method for managing dynamic network sessions.
  615. Beser, Nurettin B.; Fijolek, John G., System and method for network address maintenance using dynamic host configuration protocol messages in a data-over-cable system.
  616. Claessens,Aaron; Phillips,Chad; Brummett,Anthony, System and method for network performance testing.
  617. Friedman Aharon ; Levy Ben Zion, System and method for preventing a first node from being emulated by another node.
  618. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for preventing detection of a selected process running on a computer.
  619. Graham,Robert David; Kavaler,Peter, System and method for preventing network misuse.
  620. Vaudreuil Gregory M., System and method for private addressing plans using community addressing.
  621. Vaudreuil Gregory M., System and method for private addressing plans using community addressing.
  622. Stephenson, Mark M.; Walters, Steven A., System and method for projecting content beyond firewalls.
  623. Stephenson, Mark M.; Walters, Steven A., System and method for projecting content beyond firewalls.
  624. Fiatal, Trevor, System and method for providing a network service in a distributed fashion to a mobile device.
  625. White, Eric; Turley, Patrick, System and method for providing a secure connection between networked computers.
  626. White, Eric; Turley, Patrick, System and method for providing a secure connection between networked computers.
  627. White, Eric; Turley, Patrick, System and method for providing a secure connection between networked computers.
  628. MacKinnon, Richard; Looney, Kelly; White, Eric, System and method for providing access control.
  629. MacKinnon, Richard; Looney, Kelly; White, Eric, System and method for providing access control.
  630. Freed,Michael; Amara,Satish; Joseph,Boby, System and method for providing distributed and dynamic network services for remote access server users.
  631. Zenchelsky Daniel N. ; Dutta Partha P. ; London Thomas B. ; Vrsalovic Dalibor F. ; Siil Karl Andres, System and method for providing peer level access control on a network.
  632. Elliott, Isaac K.; Reynolds, Tim E.; Krishnaswamy, Sridhar, System and method for providing requested quality of service in a hybrid network.
  633. Isaac K. Elliott ; Tim E. Reynolds ; Sridhar Krishnaswamy, System and method for providing requested quality of service in a hybrid network.
  634. Boebert, William E.; Rogers, Clyde O.; Andreas, Glenn; Hammond, Scott W.; Gooderum, Mark P., System and method for providing secure internetwork services via an assured pipeline.
  635. Boebert, William E.; Rogers, Clyde O.; Andreas, Glenn; Hammond, Scott W.; Gooderum, Mark P., System and method for providing secure internetwork services via an assured pipeline.
  636. Boebert,William E.; Rogers,Clyde O.; Andreas,Glenn; Hammond,Scott W.; Gooderum,Mark P., System and method for providing secure internetwork services via an assured pipeline.
  637. Tighe, James R.; Higgins, Ronald D.; Platt, Richard B.; Bell, Robert T., System and method for providing security in a telecommunication network.
  638. Tighe,James R.; Higgins,Ronald D.; Platt,Richard B.; Bell,Robert T., System and method for providing security in a telecommunication network.
  639. Gilhuly, Barry J.; Van, Ngoc Anh; Rahn, Steven M.; Mousseau, Gary P.; Lazaridis, Mihal, System and method for pushing information between a host system and a mobile data communication device.
  640. Mousseau, Gary P; Ferguson, Tabitha; Linkert, Barry; Vander Veen, Raymond; Castell, William D.; Lazaridis, Mihal, System and method for pushing information from a host system to a mobile data communication device.
  641. Mousseau,Gary P.; Ferguson,Tabitha K.; Linkert,Barry; Vander Veen,Raymond P.; Castell,William D.; Lazaridis,Mihal, System and method for pushing information from a host system to a mobile data communication device.
  642. Mousseau,Gary P.; Lazaridis,Mihal, System and method for redirecting message attachments between a host system and a mobile data communication device.
  643. Applegate John ; Romatoski Jeff, System and method for redirecting network traffic to provide secure communication.
  644. Luna, Michael; Diederich, Anton, System and method for reduction of mobile network traffic used for domain name system (DNS) queries.
  645. Maggenti, Mark, System and method for registering IP address of wireless communication device.
  646. Arutyunov,Yuri; Fijolek,John G.; Lee,Ronald; Necka,William, System and method for resolving network addresses for network devices on distributed network subnets.
  647. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  648. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  649. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  650. Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for securely synchronizing multiple copies of a workspace element in a network.
  651. Caronni, Germano; Gupta, Amit; Kulmar, Sandeep; Markson, Tom R.; Schuba, Christoph L.; Scott, Glenn C., System and method for separating addresses from the delivery scheme in a virtual private network.
  652. Caronni, Germano; Gupta, Amit; Kulmar, Sandeep; Markson, Tom R.; Schuba, Christoph L.; Scott, Glenn C., System and method for separating addresses from the delivery scheme in a virtual private network.
  653. Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for synchronizing electronic mail between a client site and a central site.
  654. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  655. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  656. Sutaria, Jay; Nanjundeswaran, Sridhar; Gustafson, Brian; van Gent, Robert, System and method for tracking billing events in a mobile wireless network for a network operator.
  657. Sharp, Clifford F.; Dark, Susan Pittman, System and method for traffic management control in a data transmission network.
  658. Freed,Michael; Amara,Satish; Borella,Michael, System and method for traffic shaping based on generalized congestion and flow control.
  659. Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Ying,Christine C., System and method for transmitting workspace elements across a network.
  660. Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for using a global translator to synchronize workspace elements across a network.
  661. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for using a registered name to connect network devices with a link that uses encryption.
  662. Mendez Daniel J., System and method for using a workspace data manager to access, manipulate and synchronize network data.
  663. Riggins, Mark D., System and method for using an authentication applet to identify and authenticate a user in a computer network.
  664. Moran, Douglas B., System and method for using timestamps to detect attacks.
  665. Fiatal, Trevor, System and method of a relay server for managing communications and notification between a mobile device and a web access server.
  666. Frailong Jean-Marc ; McManis Charles ; Price Charles A. ; Herbert Mark James ; Gastinel Jean Antoine ; Tardo Joseph John, System and method of configuring a remotely managed secure network interface.
  667. Stockwell Edward B. ; Greve Paula Budig, System and method of electronic mail filtering using interconnected nodes.
  668. Kaleedhass, Kartik, System and method of preventing the transmission of known and unknown electronic content to and from servers or workstations connected to a common network.
  669. Swift, Michael M.; Amit, Neta; Ward, Richard B., System and method of proxy authentication in a secured network.
  670. Swift,Michael M.; Amit,Neta; Ward,Richard B., System and method of proxy authentication in a secured network.
  671. Heilmann, Craig; Beebe, Todd; Buntin, David; Schmid, Greg; Applonie, Robert A.; Pickens, Keith S., System and method to discriminate call content type.
  672. Freund Gregor, System and methodology for managing internet access on a per application basis for client computers connected to the int.
  673. Albert, Anthony; Kawamura, Kyle; Haycock, Keith; Herrmann, Conrad, System and methodology for security policy arbitration.
  674. Teixeira, Steven L., System and methodology providing information lockbox.
  675. Quinlan, Sean M.; Mendez, Daniel J.; Joshi, Rajiv; Ardulov, Yuri, System and methods for asynchronous synchronization.
  676. Quinlan, Sean; Mendez, Daniel J.; Joshi, Rajiv; Ardulov, Yuri, System and methods for asynchronous synchronization.
  677. Quinlan, Sean; Mendez, Daniel J.; Joshi, Rajiv; Ardulov, Yuri, System and methods for asynchronous synchronization.
  678. Baker, Lara H.; Bailey, David J., System for controlling movement of information using an information diode between a source network and a destination network.
  679. Jones,Jeffrey Allen; Reed,Aaron Keith; Rothert,Douglas Scott, System for controlling transmission of information on the internet.
  680. Reshef, Eran; El-Hanany, Yuval; Raanan, Gil; Tsarfati, Tom, System for determining web application vulnerabilities.
  681. Reshef,Eran; El Hanany,Yuval; Raanan,Gil; Tsarfati,Tom, System for determining web application vulnerabilities.
  682. Gorman, David B.; Catherine, Gregory J.; Peragine, Richard; Conrad, Beverly; Gearhart, G. Duane; Moy, David, System for intrusion detection and vulnerability analysis in a telecommunications signaling network.
  683. Roegner, Michael W., System for managing access to protected resources.
  684. Roegner, Michael W., System for managing access to protected resources.
  685. Baehr Geoffrey G. ; Danielson William ; Lyon Thomas L. ; Mulligan Geoffrey ; Patterson Martin,FRX ; Scott Glenn C. ; Turbyfill Carolyn, System for packet filtering of data packet at a computer network interface.
  686. Baehr Geoffrey G. ; Danielson William ; Lyon Thomas L. ; Mulligan Geoffrey ; Patterson Martin,FRX ; Scott Glenn C. ; Turbyfill Carolyn, System for packet filtering of data packets at a computer network interface.
  687. Kazuhira Tanno JP, System for performing remote operation between firewall-equipped networks or devices.
  688. Tanno Kazuhira,JPX, System for performing remote operation between firewall-equipped networks or devices.
  689. Fiatal, Trevor, System for providing policy based content service in a mobile network.
  690. Boebert William E. ; Rogers Clyde O. ; Andreas Glenn ; Hammond Scott W. ; Gooderum Mark P., System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting.
  691. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, System for providing security for ad hoc networked computerized devices.
  692. Freund,Gregor; Haycock,Keith; Hermann,Conrad, System methodology for automatic local network discovery and firewall reconfiguration for mobile computing devices.
  693. Luna, Michael, System of redundantly clustered machines to provide failover mechanisms for mobile traffic management and network resource conservation.
  694. Freund, Gregor Paul; Haycock, Keith Allan; Herrmann, Conrad Kamaha'o, System providing internet access management with router-based policy enforcement.
  695. Herrmann, Conrad K., System providing methodology for access control with cooperative enforcement.
  696. Eastep, Guido M.; Litzenberger, Paul; Orebaugh, Shannon R., System, method and article of manufacture for a call back architecture in a hybrid network with support for internet telephony.
  697. Underwood, Roy Aaron, System, method and article of manufacture for an activity framework design in an e-commerce based environment.
  698. Elliott,Isaac K., System, method and article of manufacture for selecting a gateway of a hybrid communication system architecture.
  699. Givoly,Tal, System, method and computer program product for processing network accounting information.
  700. Backholm, Ari; Alisawi, Rami, Systems and methods for application management of mobile device radio state promotion and demotion.
  701. Pagan, Florence C. I.; Short, Joel E., Systems and methods for authorizing, authenticating and accounting users having transparent computer access to a network using a gateway device.
  702. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Systems and methods for connecting network devices over communication network.
  703. Panasyuk,Anatoliy; Kramer,Andre; Pedersen,Bradley Jay; Stone,David Sean; Treder,Terry, Systems and methods for continuing an operation interrupted from a reconnection between a client and server.
  704. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for controlling user perceived connection speed.
  705. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  706. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  707. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Systems and methods for maintaining a client's network connection thru a change in network identifier.
  708. Panasyuk,Anatoliy; Kramer,Andre; Pedersen,Bradley Jay; Stone,David Sean; Treder,Terry, Systems and methods for maintaining a session between a client and host service.
  709. Peterson, Matthew T.; Peterson, Daniel F., Systems and methods for managing policies on a computer.
  710. Peterson, Matthew T.; Peterson, Daniel F., Systems and methods for managing policies on a computer.
  711. Peterson, Matthew T.; Peterson, Daniel F., Systems and methods for managing policies on a computer.
  712. Peterson, Matthew T.; Peterson, Daniel F., Systems and methods for managing policies on a computer.
  713. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  714. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  715. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing content and services on a network system.
  716. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  717. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  718. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  719. Short,Joel E.; Pagan,Florence C. I.; Goldstein,Josh J., Systems and methods for providing dynamic network authorization authentication and accounting.
  720. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing dynamic network authorization, authentication and accounting.
  721. Short, Joel E; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing dynamic network authorization, authentication and accounting.
  722. Sutaria, Jay; Gustafson, Brian Daniel; van Gent, Robert Paul; Lin, Ruth; Merriwether, David; Sawhney, Parvinder, Systems and methods for simplified provisioning.
  723. Baum, Marc; Dawes, Paul J.; Kinney, Mike; Raji, Reza; Swenson, David; Wood, Aaron, Takeover of security network.
  724. Baum, Marc; Dawes, Paul J.; Kinney, Mike; Raji, Reza; Swenson, David; Wood, Aaron, Takeover processes in security network integrated with premise security system.
  725. Baum, Marc; Dawes, Paul J.; Kinney, Mike; Raji, Reza; Swenson, David; Wood, Aaron, Takeover processes in security network integrated with premise security system.
  726. White, Patrick E.; Farris, Robert D., Telephone service via networking.
  727. White, Patrick E.; Farris, Robert D., Telephone service via packet-switched networking.
  728. Farris, Robert D.; Bartholomew, Dale L., Telephony communication via varied redundant networks.
  729. Buntin, David L.; Pickens, Keith S.; Collier, Mark D.; Smith, Kirk E., Telephony security system.
  730. Buntin,David L.; Pickens,Keith S., Telephony security system.
  731. Heilmann Craig ; Beebe Todd, Telephony security system.
  732. Heilmann, Craig; Beebe, Todd, Telephony security system.
  733. Heilmann, Craig; Collier, Mark D.; Conyers, Doug; Pickens, Keith S.; Buntin, David; Schmid, Greg; Faustino, Stephen; Beebe, Todd; Brysch, Michael; Applonie, Robert R., Telephony security system.
  734. Heilmann,Craig; Collier,Mark D.; Conyers,Doug; Pickens,Keith S.; Buntin,David; Schmid,Greg; Faustino,Stephen; Beebe,Todd; Brysch,Michael; Applonie,Robert R., Telephony security system.
  735. Egan, Ken; Kitchen, Jim, Temporal voltage adaptive lithium battery charger.
  736. Casella Stephen R. ; Bardani ; Jr. Robert L. ; Swan David M., Testing and debugging tool for network applications.
  737. Haff, Maurice W.; Clarke, Christopher D., Third party authentication of files in digital systems.
  738. Johnson, Jim; Egan, Kenneth, Three-way switch.
  739. Beebe Todd ; Collier Mark D. ; Conyers Doug ; Hamlett Chris ; Faustino Stephen, Tightly integrated cooperative telecommunications firewall and scanner with distributed capabilities.
  740. Luna, Michael; Tervahauta, Mikko, Timing of keep-alive messages used in a system for mobile network resource conservation and optimization.
  741. Templin Fred L. ; Gupta Ajay ; Skinner Gregory D. ; Tynan Dermot Matthew,IEX, Transparent and secure network gateway.
  742. Blum Scott B. ; Lueker Jonathan, Transparent proxy server.
  743. Hammond Scott ; Young Jeffery ; Stockwell Edward B., Transparent security proxy for unreliable message exchange protocols.
  744. Finkelstein, Amit; Lifschitz, Avihai; Dinerstein, Yosef; Caspi, Ziv, Transparently extensible firewall cluster.
  745. Qu, Diheng; Leavy, Nicholas; Fox, Richard, Transparently proxying transport protocol connections using an external server.
  746. Bartholomew, Dale L.; Farris, Robert D.; Flaherty, Stephen J., Transport of caller identification information through diverse communication networks.
  747. Medin, Craig; Shelton, Timothy, Triggering actions on a computing device.
  748. Caronni, Germano; Gupta, Amit; Kumar, Sandeep; Markson, Tom R.; Schuba, Christoph L.; Scott, Glenn C., Truly anonymous communications using supernets, with the provision of topology hiding.
  749. Reed Mark Joseph ; Arnovitz David A. ; Watt Charles ; Jacobs William Reese, Trusted gateway agent for web server programs.
  750. Luckenbaugh Gary L. ; Stoakes Forrest E., Trusted services broker for web page fine-grained security labeling.
  751. Hrastar,Scott E.; Bowcutt,Roy A., Two-tiered authorization and authentication for a cable data delivery system.
  752. Andersson Dick Sven,SEX ; Karlsson Torgny,SEX ; Herlitz Anders,SEX, Use of transmission control protocol proxy within packet data service transmissions in a mobile network.
  753. Luna, Michael; Bott, Ross, User as an end point for profiling and optimizing the delivery of content and data in a wireless network.
  754. Shrader, Theodore Jack London, User control of web browser user data.
  755. Caronni, Germano; Gupta, Amit; Markson, Tom R.; Kumar, Sandeep; Schuba, Christoph L.; Scott, Glenn C., Using multicasting to provide ethernet-like communication behavior to selected peers on a network.
  756. Hesselink, Lambertus; Rizal, Dharmarus; van Beurden, Joep; Bjornson, Eric S., VCR webification.
  757. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Virtual host for protocol transforming traffic traversing between an IP-compliant source and non-IP compliant destination.
  758. Voit, Eric A.; Curry, James E.; Farris, Robert D., Voice call alternative routing through PSTN and internet networks.
  759. Taylor,Patrick; Mewett,Scott; Brass,Philip C.; Doty,Theodore R., Vulnerability assessment and authentication of a computer by a local scanner.
  760. Gobin, Parmeshwar; Hall, Henry Huntington; Hauryluck, Carla Reale; Kanze, Daniel Robert; Liburd, Steven William; Sandt, Kirk Van; Swei, Jia Huei, Web based integrated customer interface for invoice reporting.
  761. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Web server employing multi-homed, modular framework.
  762. Wesinger, Jr., Ralph E.; Coley, Christopher D., Web server with animation player.
  763. Fiatal, Trevor, Web-based access to data objects.
  764. Shrader Theodore Jack London, Web-based administration of IP tunneling on internet firewalls.
  765. Burd, Dana; Dawes, Paul J., WiFi-to-serial encapsulation in systems.
  766. Luna, Michael, Wireless traffic management system cache optimization using http headers.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로