$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Firewall system for protecting network elements connected to a public network

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/14
출원번호 US-0595957 (1996-02-06)
발명자 / 주소
  • Coley Christopher D.
  • Wesinger
  • Jr. Ralph E.
출원인 / 주소
  • Network Engineering Software
대리인 / 주소
    McDonnell Boehnen Hulbert & Berghoff
인용정보 피인용 횟수 : 351  인용 특허 : 23

초록

Providing a firewall for isolating network elements from a publicly accessible network to which such network elements are attached. The firewall operates on a stand alone computer connected between the public network and the network elements to be protected such that all access to the protected netw

대표청구항

[ What is claimed is:] [1.] A firewall system for protecting a network element from access over a network to which the network element is attached, the firewall system comprising:a firewall box comprising a stand alone computing platform;a first connection connecting the firewall box to the network

이 특허에 인용된 특허 (23)

  1. Vu Hung T. (Ottawa CAX), Apparatus and method for providing a secure gateway for communication and data exchanges between networks.
  2. Boyle John M. (Cranford NJ) Maiwald Eric S. (Southfields NY) Snow David W. (Convent Station NJ), Apparatus and method for providing multi-level security for communication among computers and terminals on a network.
  3. Chen James F. (Potomac MD) Wang Jieh-Shan (Potomac MD), Application level security system and method.
  4. Perlman Radia J. (Acton MA) Reed Edwards E. (Lindon UT) Carter Tammy G. (Pleasant Grove UT), Certificate revocation performance optimization.
  5. Krajewski ; Jr. Marjan (Acton MA) Chipchak John C. (Dracut MA) Chodorow David A. (Groton MA) Trostle Jonathan T. (Lexington MA) Baldwin Peter T. (Rowley MA), Electronic information network user authentication and authorization system.
  6. Landfield Kent B. (Papillion NE) Zechmann Albert J. (Omaha NE), Electronic mail management system for operation on a host computer system.
  7. Savar Eugene (Atco NJ), Financial transaction system.
  8. Shavit Eyal (New York NY) Teichner Lester (Chicago IL), Interactive market management system.
  9. Hann J. David (Vienna VA) Holdahl Theodore S. (Bethesda MD) Lum James C. P. (Herndon VA), Method and apparatus for enhancing security of communications in a packet-switched data communications system.
  10. Aziz Ashar (Fremont CA), Method and apparatus for key-management scheme for use with internet protocols at site firewalls.
  11. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
  12. Denslow David L. (Rochester NY), Method of conducting secure operations on an uncontrolled network.
  13. Yoshida Shinichi (Kashihara JPX) Onozaki Manabu (Nara JPX) Muramatsu Tsuyoshi (Tenri JPX), Method of verifying identification data in data driven information processing system.
  14. Nguyen Minhtam C. (335 Elan Village La. ; Apt. 217 San Jose CA 95134), Network with secure communications sessions.
  15. Kung Kenneth C. (Cerritos CA), One-time logon means and methods for distributed computing systems.
  16. Linehan Mark H. (Yorktown Heights NY) Simicich Nicholas J. (Boca Raton FL) Tsudik Gene Y. (Thalwil CHX), Personal key archive.
  17. Boebert William E. (Minneapolis MN) Kain Richard Y. (Minneapolis MN), Secure data processing system architecture with format control.
  18. Gelb Edward J. (Wayne NJ), Security system for preventing unauthorized communications between networks by translating communications received in ip.
  19. Kaufman Charles W. (Northborough MA) Pearlman Radia J. (Acton MA) Gasser Morrie (Hopkinton MA), System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authe.
  20. Shwed Gil (Jerusalem ILX), System for securing inbound and outbound data packet flow in a computer network.
  21. Kralowetz Joseph D. (Germantown MD) Ortega Douglas F. (Laytonsville MD), Transparent support of protocol and data compression features for data communication.
  22. Falk Johan Per (Stockholm SEX) Jonsson Bjorn Erik Rutget (Jarfalla SEX), User authentication method and apparatus.
  23. Yu Kin C. (Burlington MA), Virtual network mechanism to access well known port application programs running on a single host system.

이 특허를 인용한 특허 (351)

  1. Hannel, Clifford Lee; May, Anthony, Access control.
  2. Alkhatib,Hasan S.; Zhang,Yun Fei; Tobagi,Fouad A.; Elwailly,Farid F., Accessing an entity inside a private network.
  3. Abrams,Roger Kenneth, Additional layer in operating system to protect system from hacking.
  4. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  5. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  6. Epstein, Jeremy; Thomas, Linda, Advanced data guard having independently wrapped components.
  7. Lingafelt,C. Steven; McConnell,Daniel Edward; Noel, Jr.,Francis E.; Sannipoli,Charles J., Apparatus and method for using a network processor to guard against a "denial-of-service" attack on a server or server cluster.
  8. Maria Arturo ; Owens Leslie Dale, Apparatus for filtering packets using a dedicated processor.
  9. Oishi, Kazuomi, Apparatus for limiting use of particular network address.
  10. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Apparatus for providing security over untrusted networks.
  11. Foss Andrew L. ; Howes Richard A. ; Leblanc William M. ; Kersey Edward C., Apparatus for simulating internet traffic.
  12. Hind John Raithel ; Lindquist David Bruce ; Nanavati Pratik Biharilal ; Tan Yih-Shin ; Wesley Ajamu Akinwunmi, Applet redirection for controlled access to non-orginating hosts.
  13. Ben-Itzhak, Yuval, Application layer security method and system.
  14. Nilsen, B.o slashed.rge, Arrangement in a data communication system.
  15. Friedman, Gregory S.; Marl, Coyle Brett, Asynchronous real-time retrieval of data.
  16. Friedman, Gregory Scott; Marl, Coyle Brett, Asynchronous real-time retrieval of data.
  17. Friedman, Gregory Scott; Marl, Coyle Brett, Asynchronous real-time retrieval of data.
  18. Ratnaraj Paul J. ; McCartney William Gerard ; To Son ; Crispi Steven J. ; Akhavein Jalal D., Authenticated access to internet based research and data services.
  19. Brownell, David, Authenticated firewall tunneling framework.
  20. Brownell,David, Authenticated firewall tunneling framework.
  21. Jennings, Cullen; Touitou, Dan; Wing, Daniel, Authentication of SIP and RTP traffic.
  22. Dixon Michael D., Bi-directional process-to-process byte stream protocol.
  23. Dixon,Michael D., Bi-directional process-to-process byte stream protocol.
  24. Carter, Earl T., Binary state machine system and method for REGEX processing of a data stream in an intrusion detection system.
  25. Greschler, David M.; Mysliwy, Owen; Schaefer, Stuart, Business method and system for serving third party software applications.
  26. Cornils Curtis Lee, Channel isolation arrangement and method for dissociated data.
  27. Ellis, Frampton Erroll, Commercial distributed processing by personal computers over the internet.
  28. Alkhatib, Hasan S., Communicating between address spaces.
  29. Alkhatib, Hasan S.; Tabagi, Fouad A.; Elwailly, Farid F.; Wootton, Bruce C., Communicating with an entity inside a private network using an existing connection to initiate communication.
  30. Alkhatib, Hasan; Tobagi, Fouad; Wootton, Bruce C, Communication using two addresses for an entity.
  31. Alkhatib,Hasan S.; Tobagi,Fouad A.; Wootton,Bruce C., Communication using two addresses for an entity.
  32. Ellis, Frampton E., Computer and microprocessor control units that are inaccessible from the internet.
  33. Ellis, Frampton E., Computer or microchip controlled by a firewall-protected master controlling microprocessor and firmware.
  34. Ellis, Frampton E., Computer or microchip including a network portion with RAM memory erasable by a firewall-protected master controller.
  35. Ellis, Frampton E., Computer or microchip with a secure control bus connecting a central controller to volatile RAM and the volatile RAM to a network-connected microprocessor.
  36. Ellis, Frampton E., Computer or microchip with a secure system BIOS and a secure control bus connecting a central controller to many network-connected microprocessors and volatile RAM.
  37. Ellis, Frampton E., Computer or microchip with a secure system bios having a separate private network connection to a separate private network.
  38. Ellis, Frampton E., Computer or microchip with an internal hardware firewall and a master controlling device.
  39. Ellis, Frampton E., Computer or microchip with its system bios protected by one or more internal hardware firewalls.
  40. Ellis, Frampton E., Computer with at least one faraday cage and internal flexibility sipes.
  41. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Computerized access device with network security.
  42. Ellis, III, Frampton E., Computers and microchips with a faraday cage, a side protected by an internal hardware firewall and an unprotected side connected to the internet for network operations, and with internal hardware compartments.
  43. Ellis, Frampton E., Computers and microchips with a faraday cage, with a side protected by an internal hardware firewall and unprotected side connected to the internet for network operations, and with internal hardware compartments.
  44. Ellis, III, Frampton E., Computers and microchips with a portion protected by an internal hardware firewall.
  45. Ellis, III, Frampton E., Computers and microchips with a portion protected by an internal hardware firewalls.
  46. Ellis, III, Frampton E., Computers and microchips with a side protected by an internal hardware firewall and an unprotected side connected to a network.
  47. Ellis, III, Frampton Erroll, Computers and microchips with a side protected by an internal hardware firewall and an unprotected side connected to a network.
  48. Ellis, Frampton E., Computers including an undiced semiconductor wafer with Faraday Cages and internal flexibility sipes.
  49. Ellis, III, Frampton E., Computers or microchips with a hardware side protected by a primary internal hardware firewall and an unprotected hardware side connected to a network, and with multiple internal hardware compartments protected by multiple secondary inner hardware firewalls.
  50. Ellis, III, Frampton E., Computers or microchips with a hardware side protected by a primary internal hardware firewall leaving an unprotected hardware side connected to a network, and with multiple internal hardware compartments protected by multiple secondary interior hardware firewalls.
  51. Ellis, Frampton E., Computers or microchips with a primary internal hardware firewall and with multiple internal harware compartments protected by multiple secondary interior hardware firewalls.
  52. Hirashima,Shigeyoshi; Horii,Shinichi; Tokunaga,Hiroshi; Nakamura,Masato, Connection apparatus for connecting a source over a network to a predetermined destination, connecting method, and storage medium for storing computer-readable program having connecting functions.
  53. Hirashima,Shigeyoshi; Horii,Shinichi; Tokunaga,Hiroshi; Nakamura,Masato, Connection apparatus, connecting method, and storage medium for storing computer-readable program having connecting functions.
  54. Edwards,James W.; Saint Hilaire,Ylian; Richardson,John W., Connectivity in the presence of barriers.
  55. Chaudhry, Puneesh; Jain, Sanjay, Constant access gateway and de-duplicated data cache server.
  56. Goss, Raymond G.; Ravenscroft, Donald, Contact server for call center.
  57. Goss, Raymond G.; Ravenscroft, Donald, Contact server for call center.
  58. Goss, Raymond G; Ravenscroft, Donald, Contact server for call center.
  59. Raymond G. Goss ; Donald Ravenscroft, Contact server for call center for syncronizing simultaneous telephone calls and TCP/IP communications.
  60. Sevcik Maximilian,DEX, Control in an intelligent network.
  61. Li Bobby ; Chen Eva, Controlled distribution of application programs in a computer network.
  62. Smith, Fred Hewitt, Controlling user access to electronic resources without password.
  63. Smith, Fred Hewitt, Controlling user access to electronic resources without password.
  64. Smith, Fred Hewitt, Controlling user access to electronic resources without password.
  65. Alkhatib, Hasan S; Tobagi, Fouad A, Creating a public identity for an entity on a network.
  66. Juels,Ari; Brainard,John, Cryptographic countermeasures against connection depletion attacks.
  67. Tzakikario, Rephael; Touitou, Dan; Pazi, Guy, DNS anti-spoofing using UDP.
  68. Wood,David L.; Weschler,Paul; Norton,Derk; Ferris,Chris; Wilson,Yvonne; Soley,William R., Default credential provisioning.
  69. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  70. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  71. Himberger, Kevin; Jeffries, Clark D., Determining blocking measures for processing communication traffic anomalies.
  72. Jones, Kevin Brian; Pointon, Richard, Device internet resource access filtering system and method.
  73. Jiao,Fan, Directory-enabled network elements.
  74. Schneider, David S.; Ribet, Michael B.; Lipstone, Laurence R.; Jensen, Daniel, Distributed administration of access to information and interface for same.
  75. Shiiyama, Hirotaka, Document management system using an access-limited character train and password, and a method and computer-readable medium therefor.
  76. Shiiyama Hirotaka,JPX, Document management system using an access-limited character train and password, and method and computer-readable medium therefor.
  77. Robert E. Gleichauf ; Gerald S Lathem ; Scott V. Waddell, Domain mapping method and system.
  78. Tock,Theron; Srinivas,Sampath; Sang,Yvonne Pui Fung, Dual authentication of a requestor using a mail server and an authentication server.
  79. Schmid, Greg; Pickens, Keith S.; Heilmann, Craig; Smith, Kirk, Encapsulation, compression and encryption of PCM data.
  80. Schmid,Greg; Smith,Kirk; Pickens,Keith S.; Heilmann,Craig, Encapsulation, compression, and encryption of PCM data.
  81. Goss, Raymond G., Enterprise contact server with enhanced routing features.
  82. Goss, Raymond G., Enterprise contact server with enhanced routing features.
  83. Goss, Raymond G., Enterprise contact server with enhanced routing features.
  84. Goddard,Stephen M., Fault tolerant firewall sandwiches.
  85. Shrader Theodore Jack London, Filter rule validation and administration for firewalls.
  86. Dowd,Patrick W.; McHenry,John T., Firewall for processing a connectionless network packet.
  87. Dowd, Patrick W.; McHenry, John T., Firewall for processing connection-oriented and connectionless datagrams over a connection-oriented network.
  88. Lee,Michael C. G., Firewall for real-time internet applications.
  89. Wesinger, Jr., Ralph E.; Coley, Christopher D., Firewall providing enhanced network security and user transparency.
  90. Aaron, Jeffrey A.; Anschutz, Thomas, Firewall system and method via feedback from broad-scope monitoring for intrusion detection.
  91. Coley Christopher D. ; Wesinger ; Jr. Ralph E., Firewall system for protecting network elements connected to a public network.
  92. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  93. Ellis, Frampton E., Global network computers.
  94. Ellis, III, Frampton E., Global network computers.
  95. Ellis, III,Frampton E., Global network computers.
  96. Ellis, III,Frampton E., Global network computers.
  97. Ellis,Frampton E, Global network computers.
  98. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
  99. Loveland,Shawn Domenic, Granular authorization for network user sessions.
  100. Tang, Yuchun; He, Yuanchen, Granular support vector machine with random granularity.
  101. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  102. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  103. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  104. Wu, Handong; Sufleta, Zbigniew, High performance packet processing using a general purpose processor.
  105. Wu, Handong; Sufleta, Zbigniew, High performance packet processing using a general purpose processor.
  106. Felsher, David Paul, Information record infrastructure, system and method.
  107. Ellis,Frampton E., Internal firewall for a personal computer to deny access by a network to a user's secure portion.
  108. Ellis, III, Frampton E., Internal hardware firewalls for microchips.
  109. Wootton Bruce Anthony ; Colvin William G.,CAX, Internet protocol filter.
  110. Shanklin, Steven D.; Bernhard, Thomas E.; Lathem, Gerald S., Intrusion detection signature analysis using regular expressions and logical operators.
  111. Steven D. Shanklin ; Thomas E. Bernhard ; Gerald S. Lathem, Intrusion detection signature analysis using regular expressions and logical operators.
  112. Teal, Daniel M., Intrusion detection system and method having dynamically loaded signatures.
  113. Fuh,Tzong Fen; Fan,Serene H.; Qu,Diheng, Local authentication of a client at a network device.
  114. Wood, David L.; Weschler, Paul; Norton, Derk; Ferris, Chris; Wilson, Yvonne; Soley, William R., Log-on service providing credential level change without loss of session continuity.
  115. Wood, David L.; Weschler, Paul; Norton, Derk; Ferris, Chris; Wilson, Yvonne; Soley, William R., Log-on service providing credential level change without loss of session continuity.
  116. Wood,David L.; Weschler,Paul; Norton,Derk; Ferris,Chris; Wilson,Yvonne; Soley,William R., Log-on service providing credential level change without loss of session continuity.
  117. Greschler, David M.; Mysliwy, Owen; Schaefer, Stuart, METHOD AND SYSTEM FOR REMOTE NETWORKING USING PORT PROXYING BY DETECTING IF THE DESIGNATED PORT ON A CLIENT COMPUTER IS BLOCKED, THEN ENCAPSULATING THE COMMUNICATIONS IN A DIFFERENT FORMAT AND REDIRE.
  118. Anttila, Ilkka; Kihlanki, Toivo; Paltemaa, Ilpo, Management of subscriber data in mobile system.
  119. Judge, Paul; Rajan, Guru; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Message profiling systems and methods.
  120. Black, Robert Barth, Method and aparatus for presence based resource management.
  121. Ivory, Christopher Joseph, Method and apparatus for connection-oriented multiplexing and switching network analysis, management, and troubleshooting.
  122. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for content protection in a secure content delivery system.
  123. Kay, James, Method and apparatus for electronic mail filtering.
  124. Kay, James, Method and apparatus for electronic mail filtering.
  125. Kay, James, Method and apparatus for electronic mail filtering.
  126. Maria, Arturo; Owens, Leslie Dale, Method and apparatus for filtering packets using a dedicated processor.
  127. Maria, Arturo; Owens, Leslie Dale, Method and apparatus for filtering packets using a dedicated processor.
  128. Bartal,Yair; Mayer,Alain Jules; Wool,Avishai, Method and apparatus for managing a firewall.
  129. Bouthillier Stephen W. ; Seybold Ross E. ; Blowers Sydney R. ; Sulkowski ; Jr. Robert V. ; Morse Randall P., Method and apparatus for manually switching to a secured network.
  130. Black, Robert Barth, Method and apparatus for presence based resource management.
  131. Lingafelt,Charles Steven; McKenna,John Joseph; Sisk,Robert Barry, Method and apparatus for protecting a web server against vandals attacks without restricting legitimate access.
  132. Kocherlakota, Sitarama S., Method and apparatus for proxy chaining.
  133. Frenkel,Ilan; Geller,Roman; Ramberg,Yoram; Snir,Yoram, Method and apparatus for retrieving network quality of service policy information from a directory in a quality of service policy management system.
  134. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for secure content delivery over broadband access networks.
  135. Schmidt Thomas J. ; Huppert Larry ; Ben-Michael Simoni,ILX ; Ben-Nun Michael,ILX, Method and apparatus for secure remote wake-up of a computer over a network.
  136. Brantley W. Coile ; Richard A. Howes ; William M. LeBlanc, Method and apparatus for transparently proxying a connection.
  137. Coile, Brantley W.; Howes, Richard A.; LeBlanc, William M., Method and apparatus for transparently proxying a connection.
  138. Coile,Brantley W.; Howes,Richard A.; LeBlanc,William M., Method and apparatus for transparently proxying a connection.
  139. Schuba, Christoph L.; Guttman, Erik, Method and apparatus for using client puzzles to protect against denial-of-service attacks.
  140. Chang,Ching Jye; Ullmann,Lorin Evan, Method and apparatus in an application framework system for providing a port and network hardware resource firewall for distributed applications.
  141. Fry,Steven G.; Sarkar,Shantanu, Method and apparatus supporting network communications through a firewall.
  142. Naudus Stanley T., Method and protocol for synchronized transfer-window based firewall traversal.
  143. Ramaswamy, Arvind; Schenkel, David; Slavitch, Michael, Method and system for a network management console.
  144. Gleichauf, Robert E.; Teal, Daniel M.; Wiley, Kevin L., Method and system for adaptive network security using intelligent packet analysis.
  145. Robert E. Gleichauf ; Daniel M. Teal ; Kevin L. Wiley, Method and system for adaptive network security using intelligent packet analysis.
  146. Gleichauf Robert E. ; Randall William A. ; Teal Daniel M. ; Waddell Scott V. ; Ziese Kevin J., Method and system for adaptive network security using network vulnerability assessment.
  147. Kevin J. Ziese, Method and system for dynamically distributing updates in a network.
  148. Ziese,Kevin J., Method and system for dynamically distributing updates in a network.
  149. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Method and system for establishing a security perimeter in computer networks.
  150. Hollander, Yona; Rachman, Ophir; Horovitz, Oded, Method and system for intercepting an application program interface.
  151. Gleichauf, Robert E.; Lathem, Gerald; Waddell, Scott V., Method and system for mapping a network for system security.
  152. Cunningham Mark,GBX ; Trevarrow Andrew,GBX, Method and system for monitoring and controlling network access.
  153. Rabadan, Carlos Lopez; Guillem, Jordi Juan; Sankar, Swaminathan, Method and system for prioritizing security operations in a communication network.
  154. Brown,Frances C; Crayne,Susan; Detweiler,Samuel R.; Fairweather,Peter Gustav; Hanson,Vicki Lynne; Schwerdtfeger,Richard Scott; Tibbitts,Beth Rush; Trewin,Sharon Mary, Method and system for providing a central repository for client-specific accessibility.
  155. Frauenhofer Thomas Valentine ; Marques Joaquin Manuel ; Moran Michael Edward ; Palchowdhury Subhas ; Schaffer Jeffrey Stephen, Method and system for providing access for categorized information from online internet and intranet sources.
  156. Tock, Theron; Srinivas, Sampath, Method and system for providing secure access to private networks.
  157. Tock, Theron; Srinivas, Sampath, Method and system for providing secure access to private networks.
  158. Tock, Theron; Srinivas, Sampath, Method and system for providing secure access to private networks.
  159. Tock, Theron; Xia, Zeqing, Method and system for providing secure access to private networks.
  160. Tock, Theron; Xia, Zeqing, Method and system for providing secure access to private networks.
  161. Tock, Theron; Xia, Zeqing, Method and system for providing secure access to private networks.
  162. Thomas, Christopher; Tock, Theron; Ramachandran, Sriram, Method and system for providing secure access to private networks with client redirection.
  163. Ziese, Kevin J., Method and system for providing tamper-resistant executable software.
  164. Slavin, Sean; Cook, Jay S.; El-Sabaaly, Hatem K., Method and system for remote control of a local system.
  165. Slavin,Sean; Cook,Jay S.; El Sabaaly,Hatem K., Method and system for remote control of a local system.
  166. Greschler,David M.; Mysliwy,Owen; Schaefer,Stuart, Method and system for serving software applications to client computers.
  167. Schuster, Wolfgang, Method and transaction interface for secure data exchange between distinguishable networks.
  168. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for authenticating a user access request.
  169. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for authenticating a user access request.
  170. Cox, Dennis; McClanahan, Kip, Method for blocking denial of service and address spoofing attacks on a private network.
  171. Cox, Dennis; McClanahan, Kip, Method for blocking denial of service and address spoofing attacks on a private network.
  172. Truong, Steve H., Method for checkpointing and reconstructing separated but interrelated data.
  173. Greschler,David M.; Schaefer,Stuart, Method for serving third party software applications from servers to client computers.
  174. Ben Itzhak, Yuval, Method for the automatic setting and updating of a security policy.
  175. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for transparently managing outbound traffic from an internal user of a private network destined for a public network.
  176. Morgan, Dennis; Gavrilescu, Alexandru; Burstein, Jonathan L.; Shelest, Art; LeBlanc, David, Method of assisting an application to traverse a firewall.
  177. Tatsuya Fujiyama JP; Makoto Kayashima JP; Masato Terada JP; Osamu Katsumata JP, Method of collectively managing dispersive log, network system and relay computer for use in the same.
  178. Wong Thomas K. ; Radia Sanjay R., Method to activate unregistered systems in a distributed multiserver network environment.
  179. Coss Michael John ; Majette David L. ; Sharp Ronald L., Methods and apparatus for a computer network firewall with dynamic rule processing with the ability to dynamically alter the operations of rules.
  180. Coss,Michael John; Majette,David L.; Sharp,Ronald L., Methods and apparatus for a computer network firewall with multiple domain support.
  181. Coss Michael John ; Majette David L. ; Sharp Ronald L., Methods and apparatus for a computer network firewall with stateful packet filtering.
  182. Judge, Paul; Alperovitch, Dmitri; Caracciolo, Joel Joseph; Hernandez, Alejandro Manuel; Krasser, Sven; Schneck, Phyllis Adele, Methods and systems for exposing messaging reputation to an end user.
  183. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security for ad hoc networked computerized devices.
  184. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security over untrusted networks.
  185. Ellis, Frampton E., Microchip with faraday cages and internal flexibility sipes.
  186. Ellis, Frampton E, Microchips with an internal hardware firewall.
  187. Ellis, III, Frampton E., Microchips with an internal hardware firewall protected portion and a network portion with microprocessors which execute shared processing operations with the network.
  188. Ellis, III, Frampton E., Microchips with an internal hardware firewall that by its location leaves unprotected microprocessors or processing units which performs processing with a network.
  189. Ellis, Frampton E, Microchips with inner firewalls, faraday cages, and/or photovoltaic cells.
  190. Ellis, Frampton E., Microchips with multiple internal hardware-based firewalls and dies.
  191. Holden, James M.; Levin, Stephen E.; Snow, David W.; Snow, legal representative, Mary; Wrench, Edwin H., Mixed enclave operation in a computer network.
  192. Holden,James M.; Levin,Stephen E.; Snow, legal representative,Mary; Wrench,Edwin H.; Snow, deceased,David W., Mixed enclave operation in a computer network.
  193. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  194. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  195. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  196. Alperovitch, Dmitri; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele, Multi-dimensional reputation scoring.
  197. Pemmaraju, Ram, Multichannel device utilizing a centralized out-of-band authentication system (COBAS).
  198. Baker, Stephen M., Multilayered intrusion detection system and method.
  199. Lamb,Richard H.; Guzovsky,Eduard, Network access control using network address translation.
  200. Kenworthy, Stacy, Network attached device with dedicated firewall security.
  201. Kenworthy, Stacy, Network attached device with dedicated firewall security.
  202. Bernhard, Thomas E.; Shanklin, Steven D.; Lathem, Gerald S., Network intrusion detection signature analysis using decision graphs.
  203. Schuba, Christoph L.; Krsul, Ivan V.; Zamboni, Diego; Spafford, Eugene H.; Sundaram, Aurobindo M.; Kuhn, Markus G., Network protection for denial of service attacks.
  204. Robert Conrad Knauerhase ; Michael Man-Hak Tso, Network proxy capable of dynamically selecting a destination device for servicing a client request.
  205. Milan V. Trcka ; Kenneth T. Fallon ; Mark R. Jones ; Ronald W. Walker, Network security and surveillance system.
  206. Montini, Cory A.; Eliahu, Uri; Lieberman, David E.; Gabel, Christopher, Non-invasive metering system for software licenses.
  207. Boulanger, Alan; Himberger, Kevin; Jeffries, Clark D.; Ziraldo, John, Operating a communication network through use of blocking measures for responding to communication traffic anomalies.
  208. Jade Prashanth ; Moore Victor Stuart ; Rao Arun Mohan ; Walters Glen Robert, Outside access to computer resources through a firewall.
  209. Inoue Atsushi,JPX ; Ishiyama Masahiro,JPX ; Fukumoto Atsushi,JPX ; Tsuda Yoshiyuki,JPX ; Shimbo Atsushi,JPX ; Okamoto Toshio,JPX, Packet inspection device, mobile computer and packet transfer method in mobile computing with improved mobile computer authenticity check scheme.
  210. Amr A. Awadallah ; Michael Chen ; David Li ; Manu Thapar, Packet mapper for dynamic data packet prioritization.
  211. Shanklin, Steven D.; Lathem, Gerald S., Parallel intrusion detection sensors with load balancing for high speed networks.
  212. Shanklin, Steven D.; Lathem, Gerald S., Parallel intrusion detection sensors with load balancing for high speed networks.
  213. Shanklin, Steven D.; Lathem, Gerald S., Parallel intrusion detection sensors with load balancing for high speed networks.
  214. Ellis, III, Frampton E., Personal and server computers having microchips with multiple processing units and internal firewalls.
  215. Ellis Frampton E., Personal computer microprocessor firewalls for internet distributed processing.
  216. Ellis, Frampton E., Personal computer, smartphone, tablet, or server with a buffer zone without circuitry forming a boundary separating zones with circuitry.
  217. Schaefer, Stuart; Schmeidler, Yonah; Levin, Ilya, Policy based composite file system and method.
  218. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Portable communications device with enhanced security.
  219. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Portable computerized device with network security.
  220. Alperovitch, Dmitri; Greve, Paula; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele, Prioritizing network traffic.
  221. Alperovitch, Dmitri; Krasser, Sven; Greve, Paula; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  222. Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  223. March, Sean W.; Sollee, Patrick N.; McKnight, David W., Protecting a network from unauthorized access.
  224. Pazi, Guy; Touitou, Dan; Golan, Alon; Afek, Yehuda, Protecting against spoofed DNS messages.
  225. Pazi,Guy; Touitou,Dan; Golan,Alon; Afek,Yehuda, Protecting against spoofed DNS messages.
  226. Halasz,Sylvia; Tewani,Kamlesh T.; Tarjan,David, Protection against flooding of a server.
  227. Touitou, Dan; Lewis, Darrel; Tzadikario, Rafi; Horowitz, Karen, Protection against reflection distributed denial of service attacks.
  228. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  229. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  230. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  231. Diaz-Cuellar, Gerardo; Yariv, Eran; Abzarian, David, Remote configuration of software component using proxy.
  232. Terada, Masato; Kayashima, Makoto; Kawashima, Takahiko; Fujiyama, Tetsuya; Koizumi, Minoru; Nishimura, Kazuo; Hirayama, Kazunari; Ogino, Takaaki, Repeater and network system utililzing the same.
  233. Terada Masato,JPX ; Kayashima Makoto,JPX ; Kawashima Takahiko,JPX ; Fujiyama Tetsuya,JPX ; Koizumi Minoru,JPX ; Nishimura Kazuo,JPX ; Hirayama Kazunari,JPX ; Ogino Takaaki,JPX, Repeater and network system utilizing the same.
  234. Alperovitch, Dmitri; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Trivedi, Aarjav Jyotindra Neeta; Yang, Weilai, Reputation based connection throttling.
  235. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  236. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  237. Alperovitch, Dmitri; Krasser, Sven, Reputation based message processing.
  238. Nash, Alistair, Resource access filtering system and database structure for use therewith.
  239. Ashdown Mike ; Lynchard Steve, SS7 firewall system.
  240. Wood, David L.; Dilger, Michael B.; Pratt, Thomas; Norton, Derk; Shurygailo, Stan D., Secure data broker.
  241. Smith,Fred Hewitt; Smith,Benjamin Hewitt; Smith,Cynthia, Secure detection network system.
  242. Grantges, Jr., David R.; McGrath, Lawrence R., Secure gateway having routing feature.
  243. Magdych, James S.; Rahmanovic, Tarik; McDonald, John R.; Tellier, Brock E.; Osborne, Anthony C.; Herath, Nishad P., Secure gateway with firewall and intrusion detection capabilities.
  244. Smith, Fred Hewitt, Secure processing module and method for making the same.
  245. Wood, David L.; Pratt, Thomas; Dilger, Michael B.; Norton, Derk; Nadiadi, Yunas, Security architecture with environment sensitive credential sufficiency evaluation.
  246. Greschler, David M.; Schaefer, Stuart, Serving software applications from servers for client computers.
  247. Greschler, David M.; Schaefer, Stuart, Serving software applications from servers to client computers.
  248. Chang,Ching Jye; Ullmann,Lorin Evan, Simplified network packet analyzer for distributed packet snooper.
  249. Wood, David L.; Norton, Derk; Weschler, Paul; Ferris, Chris; Wilson, Yvonne, Single sign-on framework with trust-level mapping to authentication requirements.
  250. Cohen,Nimrod; Arieli,Guy, System and a method for testing network communication devices.
  251. Steven C. Becker ; Christine S. Chaney ; Shaun McNerney, System and method for a network-based call continuation service.
  252. Tighe,James R.; Higgins,Ronald D.; Platt,Richard B.; Bell,Robert T., System and method for a virtual telephony intermediary.
  253. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J.; Mesdaq, Ali A., System and method for analyzing web content.
  254. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A., System and method for analyzing web content.
  255. Baddour, Victor L; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A, System and method for analyzing web content.
  256. Brysch, Michael; Heilmann, Craig; Pickens, Keith S.; Applonie, Robert R., System and method for bringing an in-line device on-line and assuming control of calls.
  257. Beakley, Jonathan G., System and method for consolidating and sorting event data.
  258. Chong, Lester J; Makaijani, Michael; Cheline, Douglas, System and method for content filtering.
  259. Hubbard, Daniel Lyle; Ruskin, Dan, System and method for dynamic and real-time categorization of webpages.
  260. Pearce,Christopher E.; Whetten,Delon R.; Michalewicz,Larry G., System and method for enabling multicast telecommunications.
  261. McClain, Carolyn B.; Thatcher, Jim E., System and method for filtering of web-based content stored on a proxy cache server.
  262. McClain,Carolyn B.; Thatcher,Jim E., System and method for filtering of web-based content stored on a proxy cache server.
  263. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  264. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  265. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  266. Epstein, Jeremy; Thomas, Linda, System and method for increasing the resiliency of firewall systems.
  267. Smith, Benjamin Hewitt; Smith, Fred Hewitt, System and method for installing an auditable secure network.
  268. Smith, Benjamin Hewitt; Smith, Fred Hewitt, System and method for installing an auditable secure network.
  269. Hartmann, Richard G.; Krissell, Daniel L.; Murphy, Jr., Thomas E.; Orzel, Francine M.; Rieth, Paul F.; Stevens, Jeffrey S., System and method for managing denial of service attacks.
  270. Yang,Xuechen, System and method for managing dynamic network sessions.
  271. Cheng-San Huang TW, System and method for obstacle-free network communication.
  272. Smith, Benjamin; Sabin, Daniel; Smith, Fred Hewitt, System and method for obtaining keys to access protected information.
  273. Angelo Michael F. ; Olarig Sompong P. ; Wooten David R. ; Driscoll Dan J., System and method for performing secure device communications in a peer-to-peer bus architecture.
  274. Smith, III, Fred Hewitt; Smith, Cynthia; Smith, Benjamin; Sabin, Daniel, System and method for policy driven protection of remote computing environments.
  275. Tighe, James R.; Higgins, Ronald D.; Platt, Richard B.; Bell, Robert T., System and method for providing security in a telecommunication network.
  276. Tighe,James R.; Higgins,Ronald D.; Platt,Richard B.; Bell,Robert T., System and method for providing security in a telecommunication network.
  277. Gleichauf Robert ; Shanklin Steven, System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment.
  278. Richardson, John W.; Chouinard, David A.; Chouinard, legal representative, Karen, System and method for regulating communications to or from an application.
  279. Richardson, John W.; Chouinard, David A.; Chouinard, legal representative, Karen, System and method for regulating the flow of information to or from an application.
  280. Gleichauf Robert ; Shanklin Steven ; Waddell Scott ; Ziese Kevin, System and method for rules-driven multi-phase network vulnerability assessment.
  281. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  282. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  283. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  284. Brown, Frances C.; Crayne, Susan; Detweiler, Samuel R.; Fairweather, Peter Gustav; Farrell, Stephen Paul; Hanson, Vicki Lynne; Schwerdtfeger, Richard Scott; Tibbitts, Beth Rush, System and method for transcoding support of web content over secure connections.
  285. Smith, Fred Hewitt; Smith, Cynthia, System and method for using a separate device to facilitate authentication.
  286. Smith, Fred Hewitt; Smith, Cynthia, System and method for using a separate device to facilitate authentication.
  287. Evans, Alexander William, System and method for verification, authentication, and notification of transactions.
  288. Hubbard, Dan; Tse, Alan, System and method of analyzing web addresses.
  289. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  290. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  291. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  292. Hubbard, Dan, System and method of controlling access to the internet.
  293. Heilmann, Craig; Beebe, Todd; Buntin, David; Schmid, Greg; Applonie, Robert A.; Pickens, Keith S., System and method to discriminate call content type.
  294. Alkhatib, Hasan S.; Wootton, Bruce C., System for automatically determining a network address.
  295. Baker, Lara H.; Bailey, David J., System for controlling movement of information using an information diode between a source network and a destination network.
  296. Bakshi Bikram Singh ; Knauerhase Robert Conrad ; Tso Michael Man-Hak, System for dynamic determination of client communications capabilities.
  297. Smith Benjamin Hewitt ; Smith Fred Hewitt, System for installing information related to a software application to a remote computer over a network.
  298. Rigstad, Peter M.; Yoon, John Y.; Farahar, Mark; Subbiah, Barani; Thomsen, Brant D.; Richmond, David E.; Semel, Vered Maor; Bryner, Earl, System for providing firewall capabilities to a communication device.
  299. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, System for providing security for ad hoc networked computerized devices.
  300. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  301. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  302. Owen, Daniel L.; Kusnic, Michael W., System, method and computer program product for a collaborative decision platform.
  303. Owen, Daniel L.; Kusnic, Michael W., System, method and computer program product for a collaborative decision platform.
  304. Owen, Daniel L.; Kusnic, Michael W., System, method and computer program product for a collaborative decision platform.
  305. Minkin, Ilya; Balabine, Igor V.; Eschelbeck, Gerhard, System, method and computer program product for rule based network security policies.
  306. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  307. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  308. Judge,Paul; Rajan,Guru, Systems and methods for adaptive message interrogation through multiple queues.
  309. Judge, Paul; Rajan, Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  310. Judge,Paul; Rajan,Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  311. Judge, Paul; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Systems and methods for classification of messaging entities.
  312. Judge, Paul; Moyer, Matt; Rajan, Guru; Alperovitch, Dmitri, Systems and methods for classification of messaging entities.
  313. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  314. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  315. Judge,Paul; Rajan,Guru, Systems and methods for enhancing electronic communication security.
  316. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Sellakannu, Arasendran; Willis, Lamar Lorenzo, Systems and methods for graphically displaying messaging traffic.
  317. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Zdziarski, Jonathan Alexander, Systems and methods for identifying potentially malicious messages.
  318. Judge, Paul, Systems and methods for message threat management.
  319. Judge, Paul, Systems and methods for message threat management.
  320. Judge, Paul, Systems and methods for message threat management.
  321. Judge, Paul, Systems and methods for message threat management.
  322. Judge,Paul, Systems and methods for message threat management.
  323. Judge,Paul, Systems and methods for message threat management.
  324. Judge, Paul; Rajan, Guru, Systems and methods for secure communication delivery.
  325. Judge,Paul, Systems and methods for upstream threat pushback.
  326. Cullimore, Ian Henry Stuart, TCP/IP stack-based operating system.
  327. O'Connor William Y. ; Stanford Donald L. ; Khan Tariq M. ; Hutton Michael A. ; Beason Steve W. ; Angell Robert C., Technique for secure network transactions.
  328. McClain,Carolyn B.; Carter,Stephen R.; Rhodes,Kevin; Ackerman,Mark D.; Andersen,Carl B.; Holm,Vernon Roger; Jensen,Stuart, Techniques for content filtering.
  329. Buntin, David L.; Pickens, Keith S.; Collier, Mark D.; Smith, Kirk E., Telephony security system.
  330. Buntin,David L.; Pickens,Keith S., Telephony security system.
  331. Heilmann Craig ; Beebe Todd, Telephony security system.
  332. Heilmann, Craig; Beebe, Todd, Telephony security system.
  333. Heilmann, Craig; Collier, Mark D.; Conyers, Doug; Pickens, Keith S.; Buntin, David; Schmid, Greg; Faustino, Stephen; Beebe, Todd; Brysch, Michael; Applonie, Robert R., Telephony security system.
  334. Heilmann,Craig; Collier,Mark D.; Conyers,Doug; Pickens,Keith S.; Buntin,David; Schmid,Greg; Faustino,Stephen; Beebe,Todd; Brysch,Michael; Applonie,Robert R., Telephony security system.
  335. Beebe Todd ; Collier Mark D. ; Conyers Doug ; Hamlett Chris ; Faustino Stephen, Tightly integrated cooperative telecommunications firewall and scanner with distributed capabilities.
  336. Blum Scott B. ; Lueker Jonathan, Transparent proxy server.
  337. Finkelstein, Amit; Lifschitz, Avihai; Dinerstein, Yosef; Caspi, Ziv, Transparently extensible firewall cluster.
  338. Hannel, Clifford Lee; May, Anthony, Tunneling using encryption.
  339. Cullimore, Ian Henry Stuart; Walker, Jeremy, Ultra-small, ultra-low power single-chip firewall security device with tightly-coupled software and hardware.
  340. Shapiro Mark L. ; Subramaniam Anand ; Muthumavadi Muthukumar, User name authentication for gateway clients accessing a proxy cache server.
  341. Touitou, Dan; Pazi, Guy; Shtein, Yehiel; Tzadikario, Rephael, Using TCP to authenticate IP source addresses.
  342. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Virtual host for protocol transforming traffic traversing between an IP-compliant source and non-IP compliant destination.
  343. Alperovitch, Dmitri; Foote-Lennox, Tomo; Greve, Paula; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Zdziarski, Jonathan Alexander, Web reputation scoring.
  344. Tock, Theron; Srinivas, Sampath; Sang, Yvonne Pui Fung, Web resource request processing.
  345. Haghpassand, Joshua, Web-based security and filtering system for inbound/outbound communications with proxy chaining.
  346. Gorsuch, Thomas E., Wireless communication system having cell saturation based content delivery.
  347. Gorsuch, Thomas E., Wireless communication system having mobility-based content delivery.
  348. Gorsuch, Thomas E., Wireless communication system having mobility-based content delivery.
  349. Gorsuch, Thomas E., Wireless communication system having mobility-based content delivery.
  350. Gorsuch,Thomas E., Wireless communication system having mobility-based content delivery.
  351. Gorsuch,Thomas E., Wireless communication system having mobility-based content delivery.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트