$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for dynamic packet filter assignment 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/00
출원번호 US-0762402 (1996-12-09)
발명자 / 주소
  • Radia Sanjay R.
  • Lim Swee Boon
  • Tsirigotis Panagiotis
  • Wong Thomas K.
  • Goedman Robert J.
  • Patrick Michael W.
출원인 / 주소
  • Sun Microsystems, Inc.
대리인 / 주소
    Graham & James LLP
인용정보 피인용 횟수 : 228  인용 특허 : 0

초록

The present invention includes a method and apparatus for filtering IP packets based on events within a computer network. More specifically, the present invention includes a services management system, or SMS. The SMS manages network connections between a series of client systems and a router. An ac

대표청구항

[ What is claimed is:] [1.] A method for filtering IP packets in a computer network that includes one or more client systems, the method comprising the steps, performed by one or more computer systems, of:detecting an event associated with one of the client systems;selecting one or more filtering ru

이 특허를 인용한 특허 (228)

  1. van der Made, Peter A. J., Analytical virtual machine.
  2. van der Made,Peter A. J., Analytical virtual machine.
  3. Robert J. Levay ; Gregory V. Kaiser, Apparatus and method for inserting predetermined packet loss into a data flow.
  4. Moore, Todd A.; Longworth, Mark E.; Girardi, Brian; Love, Damon, Apparatus and method for network analysis.
  5. Maria Arturo ; Owens Leslie Dale, Apparatus for filtering packets using a dedicated processor.
  6. Mannette, Michael R.; Newlin, Douglas J.; Steinbrenner, Kurt W., Apparatus, method and system for multimedia access network channel management.
  7. Brownell, David, Authenticated firewall tunneling framework.
  8. Brownell,David, Authenticated firewall tunneling framework.
  9. Ahlberg, Axel H.; Becar, Allyn P.; Brand, Gregory L.; Fenley, Douglas B.; Jones, Chester L.; Wyrick, Robert E., Authentication and entitlement for users of web based data management programs.
  10. Woundy Richard, Auto-provisioning of user equipment.
  11. Bainbridge, David K.; Taylor, Adam L.; Hembrough, Shannon I., Automated management of network addresses in a broadband managed access environment.
  12. Bainbridge,David K.; Taylor,Adam L.; Hembrough,Shannon I., Automated management of network addresses in a broadband managed access environment.
  13. Wang,Tsung Pin; Lu,Hsiao Fen; Chen,Lien Hsun, Automatically setting method and related system.
  14. Woundy,Richard, Call signaling approach to user self-provisioning on VoIP using a touch-tone interface.
  15. Ong, David, Captive portal that modifies content retrieved from designated web page to specify base domain for relative link and sends to client in response to request from client for unauthorized web page.
  16. Ong, David T., Captive portal that modifies content retrieved from designated web page to specify base domain for relative link and sends to client in response to request from client for unauthorized web page.
  17. Lassiter, Jr., Linwood Ottis, Client server method for loading a client with a specific image or utility based on the client's state.
  18. Susaki Seiichi,JPX ; Umeki Hisashi,JPX ; Umezawa Katsuyuki,JPX ; Miyazaki Seiji,JPX ; Matsunaga Kazuo,JPX ; Kitagawa Makoto,JPX, Client-server system for controlling access rights to certain services by a user of a client terminal.
  19. Hayes ; Jr. Kent Fillmore, Client-server system for maintaining application preferences in a hierarchical data structure according to user and user group or terminal and terminal group contexts.
  20. Bar Eitan,ILX ; Nisani Mordechai,ILX, Communication management system for computer network-based telephones.
  21. Nisani, Mordechai; Shporer, Danny; Yosef, Ilan; Bar, Eitan, Communication management system for computer network-based telephones.
  22. van der Made,Peter A. J., Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine.
  23. Devine,Carol Y.; Shoulberg,Richard W.; Shifrin,Gerald A.; Pfister,Robert A.; Fenley,Douglas B.; Suscheck,Charles A.; Delano,P. Alex; Kennington,W. Russell; Brandt,Andre R.; Pillai,Sajan J.; Schwarz,Edward; Shamash,Arieh, Customer interface system for managing communications services including toll free services.
  24. Shigezumi,Makiba, DNS server filter checking for abnormal DNS packets.
  25. Warrick, Peter S.; Ong, David T., DNS-based captive portal with integrated transparent proxy to protect against user device caching incorrect IP address.
  26. Warrick, Peter S.; Ong, David T., DNS-based captive portal with integrated transparent proxy to protect against user device caching incorrect IP address.
  27. Brandt, Andre R.; Frueh, Barbara; Pillai, Sajan J.; Rehder, Karl; Shearer, Donald J., Data warehousing infrastructure for web based reporting tool.
  28. Jones, Kevin Brian; Pointon, Richard, Device internet resource access filtering system and method.
  29. Warrick, Peter S.; Cassidy, Brendan G.; Carriere, Lindsey M.; McCarthy, Michael D., Dynamic assignment of central media device supporting network-based media sharing protocol to guest device of hospitality establishment for media sharing purposes.
  30. Smith, Colin Donald; Beaton, Brian Finlay, Dynamic context filters for communication and information management.
  31. Warrick, Peter S.; Cassidy, Brendan G.; Carriere, Lindsey M.; McCarthy, Michael D., Dynamically enabling guest device supporting network-based media sharing protocol to share media content over local area computer network of lodging establishment with subset of in-room media devices connected thereto.
  32. Hegli, Ronald Bjorn; Lonas, Jr., Hal Case; Kester, Harold, Filtering techniques for managing access to internet sites or other software applications.
  33. Hegli,Ronald Bjorn; Lonas, Jr.,Hal Case; Kester,Harold, Filtering techniques for managing access to internet sites or other software applications.
  34. Maria, Arturo, Floating intrusion detection platforms.
  35. Short, Joel E.; Ewan, Ray S.; Sorcsek, Jerome, Gateway device having an XML interface and associated method.
  36. Bonn, David Wayne; Marvais, Nick Takaski, Generalized network security policy templates for implementing similar network security policies across multiple networks.
  37. Ben-Natan, Ron; Segal, Ury, Identifying attribute propagation for multi-tier processing.
  38. Barry, B. Reilly; Chodoronek, Mark A.; DeRose, Eric; Devine, Carol Y.; Studness, Mark N.; James, Angela R.; Levy, Lynne; Tusa, Michael, Integrated business system for web based telecommunications management.
  39. Barry, B. Reilly; Chodoronek, Mark A.; DeRose, Eric; Gonzales, Mark N.; James, Angela R.; Levy, Lynne; Tusa, Michael, Integrated customer interface for web based data management.
  40. Devine, Carol Y.; Shoulberg, Richard W.; Shifrin, Gerald A.; Pfister, Robert A.; Fenley, Douglas B.; Suscheck, Charles A.; Delano, P. Alex; Kennington, W. Russell; Brandt, Andre R.; Pillai, Sajan J.;, Integrated customer interface system for communications network management.
  41. Baker, Thomas E.; Chaffee, Susan L.; Chen, Yuchien; Gruber, Charles J.; Fishman, Howard P., Integrated customer web station for web based call management.
  42. Baker, Thomas E.; Chaffee, Susan L.; Chen, Yuchien; Gruber, Charles J.; Fishman, Howard P., Integrated customer web station for web based call management.
  43. Baker,Thomas E.; Chaffee,Susan L.; Chen,Yuchien; Gruber,Charles J.; Fishman,Howard P., Integrated customer web station for web based call management.
  44. Combar, Curtis T.; Devine, Carol Y.; Pfister, Robert A., Integrated interface for real time web based viewing of telecommunications network call traffic.
  45. Cogger, Timothy John; Kunkel, III, Isaac A.; Miller, David Todd; Patil, Suma P., Integrated interface for web based customer care and trouble management.
  46. Christine M. Ditmer ; James DeGraf-Johnson ; Paul Glenn Franklin ; William C. Holford ; Randall W. King ; Patrick W. Pirtle ; Kenneth Joseph Qualls ; Diane J. Wells ; Edward Ronald Zack, Jr., Integrated proxy interface for web based alarm management tools.
  47. Christine M. Ditmer ; Randall W. King ; W. Russell Kennington ; Patrick W. Pirtle ; Diane J. Wells, Integrated proxy interface for web based broadband telecommunications management.
  48. Combar,Curtis T.; Devine,Carol Y.; Flentje,William P.; Pfister,Robert A., Integrated proxy interface for web based data management reports.
  49. Devine, Carol Y.; Dollar, Tammy E.; Munguia, Wayne J.; Schwarz, Edward, Integrated proxy interface for web based report requester tool set.
  50. Delano, P. Alex; Devine, Carol Y.; Hall, Robert W.; Pfister, Robert A.; Venn, Garrison M., Integrated proxy interface for web based telecommunication toll-free network management using a network manager for downloading a call routing tree to client.
  51. Curtis T. Combar ; Robert A. Pfister, Integrated proxy interface for web based telecommunications management tools.
  52. Wayne J. Munguia ; Robert A. Pfister ; Charles A. Suscheck, Integrated proxy interface for web based telecommunications network management.
  53. Barry,B. Reilly; Chodoronek,Mark A.; DeRose,Eric; Gonzales,Mark N.; James,Angela R.; Levy,Lynne; Tusa,Michael, Integrated systems for providing communications network management services and interactive generating invoice documents.
  54. Ross, Alan D., Integration of policy compliance enforcement and device authentication.
  55. Kalofonos, Dimitris; Shakhshir, Saad, Management of access control in wireless networks.
  56. Berl, Steven H.; Tam, Ulrica, Mechanism for conveying data prioritization information among heterogeneous nodes of a computer network.
  57. Warrick, Peter S.; Cassidy, Brendan G.; Carriere, Lindsey M.; McCarthy, Michael D., Media proxy that transparently proxies network-based media sharing protocol between guest device and an associated one of a plurality of media devices.
  58. Black, Robert Barth, Method and aparatus for presence based resource management.
  59. Adelman Kenneth Allen ; Kashtan David Lyon ; Palter William L. ; Piper ; II Derrell D., Method and apparatus for a TCP/IP load balancing and failover process in an internet protocol (IP) network clustering system.
  60. Adelman Kenneth Allen ; Kashtan David Lyon ; Palter William L. ; Piper ; II Derrell D., Method and apparatus for an internet protocol (IP) network clustering system.
  61. Wong Thomas K. ; Lim Swee B. ; Radia Sanjay R. ; Tsirigotis Panagiotis ; Goedman Robert J. ; Patrick Michael W., Method and apparatus for assignment of IP addresses.
  62. Hammond, Nicolas J., Method and apparatus for auditing network security.
  63. Vogel, Mark O.; Robinson, Philip T., Method and apparatus for channel determination through power measurements.
  64. Gusler, Carl Phillip; Hamilton, II, Rick Allen, Method and apparatus for dynamic modification of internet firewalls using variably-weighted text rules.
  65. Kay, James, Method and apparatus for electronic mail filtering.
  66. Kay, James, Method and apparatus for electronic mail filtering.
  67. Kay, James, Method and apparatus for electronic mail filtering.
  68. Maria, Arturo; Owens, Leslie Dale, Method and apparatus for filtering packets using a dedicated processor.
  69. Maria, Arturo; Owens, Leslie Dale, Method and apparatus for filtering packets using a dedicated processor.
  70. Ide, Curtis E.; Brass, Philip C.; Doty, Theodore R., Method and apparatus for network assessment and authentication.
  71. Ide,Curtis E.; Brass,Philip C.; Doty,Theodore R., Method and apparatus for network assessment and authentication.
  72. Black, Robert Barth, Method and apparatus for presence based resource management.
  73. Burns, Lawrence M.; Ramachandran, Ravi, Method and apparatus for reflective mixer testing of a cable modem.
  74. Lum, Clinton Edward, Method and apparatus for remote installation of network drivers and software.
  75. Swedor, Olivier K.; Lavian, Tal I.; Duncan, Robert J., Method and apparatus for using a command design pattern to access and configure network elements.
  76. Zobel, Robert David; Dodd, Timothy David; Millar, Sharon A.; Nesfeder, Jr., David Gerald; Singer, Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  77. Zobel,Robert David; Dodd,Timothy David; Millar,Sharon A.; Nesfeder, Jr.,David Gerald; Singer,Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  78. Hammer, John M.; Ge, Rixin; Burke, Charles D.; Hubbard, Charles, Method and system for creating a record for one or more computer security incidents.
  79. Balassanian, Edward, Method and system for data demultiplexing.
  80. Balassanian, Edward, Method and system for data demultiplexing.
  81. Balassanian, Edward, Method and system for data demultiplexing.
  82. Balassanian, Edward, Method and system for data demultiplexing.
  83. Balassanian, Edward, Method and system for data demultiplexing.
  84. Balassanian, Edward, Method and system for data demultiplexing.
  85. Fijolek,John G.; Akgun,Ali; Shammas,Rita; Harper,Matthew, Method and system for dynamic service registration in a data-over-cable system.
  86. Corl, Jr., Everett Arthur; Davis, Gordon Taylor; Jeffries, Clark Debs, Method and system for exploiting likelihood in filter rule enforcement.
  87. Fijolek,John G.; Gilbert,Irene; Kulkarni,Jaideep, Method and system for integrating IP address reservations with policy provisioning.
  88. Kennis, Peter H., Method and system for intrusion detection in a computer network.
  89. Calvignac, Jean Louis; Jeffries, Clark Debs; Verplanken, Fabrice, Method and system for performing interval-based testing of filter rules.
  90. Palmer, Jr., Bernard Paul; Graham, Robert David, Method and system for protecting computer networks by altering unwanted network data traffic.
  91. Fijolek, John G.; Beser, Nurettin B., Method and system for providing quality-of-service in a data-over-cable system.
  92. Akgun, Ali; Fijolek, John G.; Sangston, Steven W.; Beser, Nurettin B., Method and system for provisioning network addresses in a data-over-cable system.
  93. Nurettin B. Beser, Method and system for quality-of-service based data forwarding in a data-over-cable system.
  94. Beser, Nurettin B., Method and system for seamless address allocation in a data-over-cable system.
  95. Fijolek, John G.; Beser, Nurettin B.; Robinson, Philip T.; Gun, Levent, Method and system for virtual network administration with a data-over cable system.
  96. Kekic Miodrag M. ; Lu Grace N. ; Carlton Eloise H., Method for building element manager for a computer network element using a visual element manager builder process.
  97. Beser, Nurettin B.; Fijolek, John G., Method for changing type-of-service in a data-over-cable system.
  98. Vogel, Mark O., Method for detecting radio frequency impairments in a data-over-cable system.
  99. Vogel,Mark O., Method for dynamic performance optimization in a data-over-cable system.
  100. Nisani, Mordechai; Bar, Eitan, Method for extracting a computer network-based telephone session performed through a computer network.
  101. Beser, Nurettin B.; Fijolek, John G., Method for network address table maintenance in a data-over-cable system using a network device registration procedure.
  102. Beser, Nurettin B.; Fijolek, John G., Method for network address table maintenance in a data-over-cable system using destination reachibility.
  103. Nisani, Mordechai; Bar, Eitan, Method for restoring a portion of a communication session transmitted over a computer network.
  104. Nisani, Mordechai; Bar, Eitan, Method for storing on a computer network a portion of a communication session between a packet source and a packet destination.
  105. Vogel, Mark O., Method for using an initial maintenance opportunity for non-contention ranging.
  106. Ippach, Holger; Le Buhan, Corinne; Uldry, Marc, Method to optimize the data stream between a router and a multimedia unit.
  107. Coss Michael John ; Majette David L. ; Sharp Ronald L., Methods and apparatus for a computer network firewall with cache query processing.
  108. Coss Michael John ; Majette David L. ; Sharp Ronald L., Methods and apparatus for a computer network firewall with dynamic rule processing with the ability to dynamically alter the operations of rules.
  109. Coss,Michael John; Majette,David L.; Sharp,Ronald L., Methods and apparatus for a computer network firewall with multiple domain support.
  110. Coss Michael John ; Majette David L. ; Sharp Ronald L., Methods and apparatus for a computer network firewall with proxy reflection.
  111. Coss Michael John ; Majette David L. ; Sharp Ronald L., Methods and apparatus for a computer network firewall with stateful packet filtering.
  112. Shaffer,Shmuel; Aviani, Jr.,James A.; Tweedly,Alexander G., Methods and apparatus for redirecting network traffic.
  113. Fijolek, John G.; Robinson, Phillip T.; Gilbert, Irene M.; Budinger, Daniel M.; Jain, Narij, Methods and systems for service level agreement enforcement on a data-over cable system.
  114. John G. Fijolek ; Levent Gun ; Ronald B. Lee ; Philip T. Robinson, Methods for restricting access of network devices to subscription services in a data-over-cable system.
  115. Cantrell,Craig; Willebeek LeMair,Marc; Cox,Dennis; Kolbly,Donovan; Smith,Brian, Multi-level packet screening with dynamically selected filtering criteria.
  116. Ross, Alan D., Multifactor device authentication.
  117. Taylor, Kevin R.; Murugesan, Ganesh; Tajalli, Homayoon, Network access control system and method using adaptive proxies.
  118. Ben-Natan, Ron, Network intrusion blocking security overlay.
  119. Hirai Jun,JPX, Network management system for managing states of nodes.
  120. Parker,Benjamin J.; Werner,Shane W.; Diaz,Charles; Frederick,Terry M., Network security services architecture.
  121. Anders Wirkestrand SE, Non-permanent address allocation.
  122. Ben-Natan, Ron, Nondestructive interception of secure data in transit.
  123. Hulse, David Andrew; Bryars, Mark Howard, Off-site user access control.
  124. Hulse, David Andrew; Bryars, Mark Howard, Off-site user access control.
  125. Hulse, David Andrew; Bryars, Mark Howard, Off-site user access control.
  126. Lakshman T. V. ; Stiliadis Dimitrios, Packet filter method and apparatus employing reduced memory.
  127. Bandi, Sridhar; Gowda, Kiran Kumar Malle, Port enablement.
  128. Joseph Joshy, Processing customized uniform resource locators.
  129. Nash, Alistair, Resource access filtering system and database structure for use therewith.
  130. Law Eddie Ka Lun,CAX ; Nandy Biswajit,CAX ; Chapman Alan S.J.,CAX, Scaleable web server and method of efficiently managing multiple servers.
  131. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure customer interface for Web based data management.
  132. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure customer interface for web based data management.
  133. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure customer interface for web based data management.
  134. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for Web based data management.
  135. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for web based data management.
  136. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for web based data management.
  137. Devine,Carol Y; Shifrin,Gerald A; Shoulberg,Richard W, Secure server architecture for web based data management.
  138. Ben-Natan, Ron; Tarandach, Izar, Selective local database access restriction.
  139. Boden,Edward B., System and method for IP packet filtering based on non-IP packet traffic attributes.
  140. Voldman,Mikhail; Budinger,Dan; Akgun,Ali; Fijolek,John G.; Vogel,Mark O.; Kelkar,Kris, System and method for a multi-frequency upstream channel in a computer network.
  141. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  142. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  143. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  144. Kester,Harold; Ruskin,Dan; Lee,Chris; Anderson,Mark, System and method for adapting an internet filter.
  145. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J.; Mesdaq, Ali A., System and method for analyzing web content.
  146. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A., System and method for analyzing web content.
  147. Baddour, Victor L; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A, System and method for analyzing web content.
  148. Karadogan, Baris; Lee, Ronald, System and method for assigning dynamic host configuration protocol parameters in devices using resident network interfaces.
  149. Pagan, Florence C. I.; Short, Joel E., System and method for authorizing a portable communication device.
  150. Willming,David; Chan,Paul; Necka,William; Lee,Ronald, System and method for automatic digital certificate installation on a network device in a data-over-cable system.
  151. Fijolek,John G.; Gilbert,Irene; Akgun,Ali; Khan,Shahidur; Swamy,Vikram, System and method for automatic load balancing in a data-over-cable network.
  152. Mohammed Mannan ; Craver Thomas R., System and method for binding a virtual device driver to a network driver interface.
  153. Del Sol, Timothy; Krishnamurthy, Gopalan, System and method for calibrating power level during initial ranging of a network client device.
  154. Seeber,Ren챕, System and method for compiling images from a database and comparing the compiled images with known images.
  155. Seeber,Ren��, System and method for compiling images from a database and comparing the compiled images with known images.
  156. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  157. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  158. Cox, Alan, System and method for domain name filtering through the domain name system.
  159. Hubbard, Daniel Lyle; Ruskin, Dan, System and method for dynamic and real-time categorization of webpages.
  160. Boden, Edward B., System and method for dynamic micro placement of IP connection filters.
  161. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  162. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  163. Cheriton,David, System and method for generating filters based on analyzed flow data.
  164. Lee,Ronald B., System and method for insuring dynamic host configuration protocol operation by a host connected to a data network.
  165. Fijolek, John G.; Beser, Nurettin B., System and method for managing channel usage in a data over cable system.
  166. Beser, Nurettin B.; Fijolek, John G., System and method for network address maintenance using dynamic host configuration protocol messages in a data-over-cable system.
  167. Claessens,Aaron; Phillips,Chad; Brummett,Anthony, System and method for network performance testing.
  168. Longworth,Mark; Abromavage,John D.; Moore,Todd A.; Totman,Scott V.; Romano,Vince, System and method for network security.
  169. Lam, Vincent; Caceres, Adrian; Eykholt, Joseph R.; Huston, Lawrence, System and method for packet forwarding.
  170. Graham,Robert David; Kavaler,Peter, System and method for preventing network misuse.
  171. Mullen, Shawn P.; McBrearty, Gerald F.; Shieh, Johnny M., System and method for providing connection orientation based access authentication.
  172. Freed,Michael; Amara,Satish; Joseph,Boby, System and method for providing distributed and dynamic network services for remote access server users.
  173. Arutyunov,Yuri; Fijolek,John G.; Lee,Ronald; Necka,William, System and method for resolving network addresses for network devices on distributed network subnets.
  174. Dooply, Ayoob Eusoof, System and method for systolic array sorting of information segments.
  175. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  176. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  177. Freed,Michael; Amara,Satish; Borella,Michael, System and method for traffic shaping based on generalized congestion and flow control.
  178. Hubbard, Dan; Tse, Alan, System and method of analyzing web addresses.
  179. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  180. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  181. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  182. Hubbard, Dan, System and method of controlling access to the internet.
  183. Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph; Kester, Harold M., System and method of monitoring and controlling application files.
  184. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  185. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  186. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  187. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  188. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  189. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  190. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  191. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  192. Kester, Harold M.; Kester Jones, legal representative, Nicole; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  193. Kester,Harold M.; Hegli,Ronald B.; Dimm,John Ross; Anderson,Mark Richard, System and method of monitoring and controlling application files.
  194. Martin Christopher W. ; Korbman Mauricio ; Green Kenneth, System for communicating state information relating to user previous interactions with other internet web sites during an internet session.
  195. Everett Arthur Corl, Jr. ; Anthony Matteo Gallo ; Clark Debs Jeffries ; Colin Beaton Verrilli, System method and computer program for prioritizing filter rules.
  196. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  197. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  198. Kaan,Keith G.; Provost,J. Thomas, System, method and computer program product for a universal communication connector.
  199. Pagan, Florence C. I.; Short, Joel E., Systems and methods for authorizing, authenticating and accounting users having transparent computer access to a network using a gateway device.
  200. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for controlling user perceived connection speed.
  201. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  202. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  203. Bahl, Paramvir; Miu, Allen K. L., Systems and methods for managing network connectivity for mobile users.
  204. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  205. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  206. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing content and services on a network system.
  207. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  208. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  209. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  210. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  211. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  212. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  213. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  214. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  215. Short, Joel E; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing dynamic network authorization, authentication and accounting.
  216. Short, Joel E.; Ewan, Ray S.; Sorcsek, Jerome, Systems and methods of communicating using XML.
  217. Berl Steven H. ; Tam Ulrica, Technique for capturing information needed to implement transmission priority routing among heterogeneous nodes of a computer network.
  218. Tam Ulrica ; Berl Steven H., Technique for capturing information needed to implement transmission priority routing among heterogeneous nodes of a computer network.
  219. Stapp, Mark; Kinnear, Jr., Kenneth; Johnson, Richard A.; Kumarasamy, Jayadev, Techniques for dynamic host configuration using overlapping network addresses.
  220. Kinnear, Jr.,Kenneth; Stapp,Mark; Johnson,Richard, Techniques for dynamic host configuration without direct communications between client and server.
  221. Audebert, Yves, Terminal and system for performing secure electronic transactions.
  222. Liu, Bing, Threat protection network.
  223. Lin, Yeejang James, Tunnel designation system for virtual private networks.
  224. Ikudome, Koichiro; Yeung, Moon Tai, User specific automatic data redirection system.
  225. Taylor,Patrick; Mewett,Scott; Brass,Philip C.; Doty,Theodore R., Vulnerability assessment and authentication of a computer by a local scanner.
  226. Klein Philippe,ILX ; Ben-Michael Simoni,ILX, Wake up of a sleeping computer using I/O snooping and imperfect packet filtering.
  227. Gobin, Parmeshwar; Hall, Henry Huntington; Hauryluck, Carla Reale; Kanze, Daniel Robert; Liburd, Steven William; Sandt, Kirk Van; Swei, Jia Huei, Web based integrated customer interface for invoice reporting.
  228. Harris, Scott C., Wireless network having multiple communication allowances.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로