$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/173
출원번호 US-0322078 (1994-10-12)
발명자 / 주소
  • Boebert William E.
  • Rogers Clyde O.
  • Andreas Glenn
  • Hammond Scott W.
  • Gooderum Mark P.
출원인 / 주소
  • Secure Computing Corporartion
대리인 / 주소
    Schwegman, Lundberg, Woessner & Kluth, P.A.
인용정보 피인용 횟수 : 414  인용 특허 : 49

초록

A system and method for the secure transfer of data between a workstation connected to a private network and a remote computer connected to an unsecured network. A secure computer is inserted into the private network to serve as the gateway to the unsecured network and a client subsystem is added to

대표청구항

[ What is claimed is:] [1.] A system for secure internetwork communication across an external network, the system comprising:first and second internal networks;first and second secure computers connected to the external network, wherein said first and second secure computers are type enforcing secur

이 특허에 인용된 특허 (49)

  1. Engel Ferdinand (Northborough MA), Access controller for local area network.
  2. Vu Hung T. (Ottawa CAX), Apparatus and method for providing a secure gateway for communication and data exchanges between networks.
  3. Seaman Michael J. (San Jose CA), Apparatus for message filtering in a network using domain class.
  4. Smith Jonathan M. (Philadelphia PA) Traw C. Brendan S. (Bensalem PA) Farber David J. (Landenberg PA), Apparatus for providing cryptographic support in a network.
  5. Zisapel Yehuda (23 Kissufim Street Tel Aviv 69355 ILX), Carrier sensing multiple access/collision detection local area networks.
  6. Barlow Douglas C. (Redmond WA), Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding s.
  7. Hardy Norman (Portola Valley CA), Computer security system.
  8. Lozowick Philip P. (Jerusalem ILX) Ben-Michael Siman-Tov (Girat Zeer ILX), Cryptographic processing in a communication network, using a single cryptographic engine.
  9. White Andrew R. (Harrow on the Hill GBX), Data communication system using encrypted data packets.
  10. Boebert William E. (Minneapolis MN) Markham Thomas R. (Anoka MN) Olmsted Robert A. (Minnetonka MN), Data enclave and trusted path system.
  11. Kodosky Jeffrey L. (Austin TX) Truchard James J. (Austin TX) MacCrisken John E. (Palo Alto CA), Graphical system for modelling a process and associated method.
  12. Foster Robert I. (Mesa AZ) Pfeifer Robert F. (Scottsdale AZ) Mihm ; Jr. Thomas J. (Mesa AZ), Hierarchical key management system.
  13. Markstein ; Peter Willy ; Tritter ; Alan Levi, Hierarchical security mechanism for dynamically assigning security levels to object programs.
  14. Frink John G. (Columbia MD), Intercomputer communications based on message broadcasting with receiver selection.
  15. Atkinson Randall (Annandale VA), Intermediate network authentication.
  16. Canale Leonard M. (Tinton Falls NJ) Kautz Henry A. (Summit NJ) Milewski Allen E. (Red Bank NJ) Selman Bart (Summit NJ), Message filtering techniques.
  17. Bakke Mark A. (Maple Grove MN) Fiore Edward J. (Ramsey MN), Method and apparatus for accelerated packet forwarding.
  18. Hu Wei-Ming (Arlington MA), Method and apparatus for authenticating a client to a server in computer systems which support different security mechan.
  19. Aziz Ashar (Fremont CA), Method and apparatus for key-management scheme for use with internet protocols at site firewalls.
  20. Boaz Wade (Clifton NJ) D\Elena Daniel (Milford NJ) Lucivero Michael (Emerson NJ) Martinez Sarka (Boca Raton FL) Salpietra Ronald J. (Novi MI) Savastano Olga E. (Bloomfield NJ) Soltis Ronald (Wayne NJ, Method and apparatus for message handling in computer systems.
  21. Jenner Earle H. (San Jose CA), Method and apparatus for restarting a computing system.
  22. Blakley ; III George R. (Austin TX) Hickerson L. Brooks (Austin TX) Milman Ivan M. (Austin TX) Gittins Robert S. (Woodland Park CO) Scheer Douglas B. (Boynton Beach FL) Wilson John H. (Austin TX), Method and system for providing a user access to multiple secured subsystems.
  23. Goldman Jonathan (Menlo Park CA) Saperstein Garry (Sunnyvale CA), Method and system for user authorization over a multi-user computer system.
  24. Coplien James O. (Wheaton IL) Williams Thomas V. (Naperville IL), Method of controlling the execution of object-oriented programs.
  25. Damashek Marc (Hampstead MD), Method of retrieving documents that concern the same topic.
  26. Vidrascu Andrei (Saint-Germain en Laye FRX) Dherbecourt Yves M. J. (Sceaux FRX) Herodin Jean-Marc (Bievres FRX), Method, apparatus and device for enciphering messages transmitted between interconnected networks.
  27. Childs ; Jr. Robert H. E. (Cupertino CA) Klebanoff Jack L. (Sunnyvale CA) Pollack Frederick J. (Aloha OR), Microprocessor memory management and protection mechanism.
  28. Loatman Robert B. (Vienna VA) Post Stephen D. (McLean VA) Yang Chih-King (Rockville MD) Hermansen John C. (Catharpin VA), Natural language understanding system.
  29. Dai Wei W. (San Jose CA) Ng Yu K. (Sunnyvale CA), Network interfacing apparatus and method using repeater and cascade interface with scrambling.
  30. Schanning Brian (Marblehead MA) Tavana Sadredin (Watertown MA) Archambault Steven E. (Haverhill MA) Hayssen ; III Carl G. (Andover MA), Network message security method and apparatus.
  31. Hershey Paul C. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Waclawsky John G. (Frederick MD) Wilkins John D. (Somerville VA), Network security system and method using a parallel finite state machine adaptive active monitor and responder.
  32. Nguyen Minhtam C. (10018 Lexington Estates Blvd. Boca Raton FL 33428), Network with secure communications sessions.
  33. Appell Marc (Paris FRX) Lepicard Georges (Vaucresson FRX) de Rivet Philippe-Hubert (Paris FRX) Bradley John J. (Garches MA FRX) Franklin Benjamin S. (Cambridge MA), Protection of data in an information multiprocessing system by implementing a concept of rings to represent the differen.
  34. Burger Wilhelm F. (Bethesda MD) Carson Mark E. (Rockville MD) Johri Abhai (Gaithersburg MD) Stokes Ellen J. (Liberty Hill TX), Remote trusted path mechanism for telnet.
  35. Boerbert William E. (Minneapolis MN), Secure computer interface.
  36. Boebert William E. (Hennepin MN) Kain Richard Y. (Hennepin MN), Secure data processing system architecture.
  37. Boebert William E. (Minneapolis MN) Kain Richard Y. (Minneapolis MN), Secure data processing system architecture.
  38. Boebert William E. (Minneapolis MN) Kain Richard Y. (Minneapolis MN), Secure data processing system architecture with format control.
  39. Carmi Ilan (Framingham MA), Security system for a network concentrator.
  40. Tuai Gregory (Seattle WA), Security system for data communications.
  41. Gelb Edward J. (Wayne NJ), Security system for preventing unauthorized communications between networks by translating communications received in ip.
  42. Pepe David Mathew (Middletown NJ) Blitzer Lisa B. (Manalapan NJ) Brockman James Joseph (Perrineville NJ) Cruz William (Eatontown NJ) Hakim Dwight Omar (Matawan NJ) Hovey Richard Reid (Somerville NJ) , System and method for providing protocol translation and filtering to access the world wide web from wireless or low-ban.
  43. Schrier Evan J. (Kirkland WA) Reardon Thomas R. (Seattle WA) Ogus Aaron W. (Kirkland WA), System and method for running multiple incompatible network protocol stacks.
  44. Thuraisngham Bhavani M. (209 Katardin Rd. Lexington MA 02173) Ford William R. B. (13 Coach Rd. Billerica MA 01862) Collins Marie S. (4452 Wordsworth Rd. Plano TX 75093) O\Keeffe Jonathan P. (70 JFK B, System for multilevel secure database management using a knowledge base with release-based and other security constraint.
  45. Francisco Emmanuel C. (Covina CA) Saunders Randy (Upland CA), System for providing high security for personal computers and workstations.
  46. Shwed Gil (Jerusalem ILX), System for securing inbound and outbound data packet flow in a computer network.
  47. Aziz Ashar (Fremont CA) Mulligan Geoffrey (Fremont CA) Patterson Martin (Grenoble FRX) Scott Glenn (Sunnyvale CA), System for signatureless transmission and reception of data packets between computer networks.
  48. Anderson Thomas G. (Los Altos CA) Boothroyd William A. (San Jose CA) Frey Richard C. (San Jose CA), Transaction execution system with secure data storage and communications.
  49. Yu Kin C. (Burlington MA), Virtual network mechanism to access well known port application programs running on a single host system.

이 특허를 인용한 특허 (414)

  1. Hannel, Clifford Lee; May, Anthony, Access control.
  2. Chen, Weifeng; Evfimievski, Alexandre V.; Liu, Zhen; Rantzau, Ralf; Riabov, Anton Viktorovich; Rohatgi, Pankaj; Schuett, Angela Marie; Srikant, Ramakrishnan; Wagner, Grant, Access control method and a system for privacy protection.
  3. Chen, Weifeng; Evfunievski, Alexandre V.; Liu, Zhen; Rantzau, Ralf; Riabov, Anton Viktorovich; Rohatgi, Pankaj; Schuett, Angela Marie; Srikant, Ramakrishnan; Wagner, Grant, Access control method and a system for privacy protection.
  4. Fu, Guangrui; Funato, Daichi; Kawahara, Toshiro; Wood, Jonathan, Access network dynamic firewall.
  5. Farber, David A.; Lachman, Ronald D., Accessing data in a data processing system.
  6. Tijerino, Yuri Adrian, Adaptive communication data retrieval system.
  7. Yuri Adrian Tijerino, Adaptive communication data retrieval system.
  8. Mahalingaiah, Rupaka, Address mapping mechanism enabling multi-domain addressing in communication networks.
  9. Mahalingaiah, Rupaka, Address mapping mechanism enabling multi-domain addressing in communication networks.
  10. Dabbiere, Alan, Advanced authentication techniques.
  11. Epstein, Jeremy; Thomas, Linda, Advanced data guard having independently wrapped components.
  12. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  13. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  14. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  15. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  16. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  17. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  18. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Apparatus for providing security over untrusted networks.
  19. Mahalingaiah, Rupaka, Apparatus, system, and method for routing data to and from a host that is moved from one location on a communication system to another location on the communication system.
  20. Goyal,Pawan; Gylfason,Snorri; Huang,Xun Wilson; Keshav,Srinivasan; Sharma,Rosen, Associating identifiers with virtual processes.
  21. Brannon, Jonathan Blake, Attempted security breach remediation.
  22. Beckman, Brian C.; Andrews, Anthony D.; Armanasu, Alexander A., Automatic object caller chain with declarative impersonation and transitive trust.
  23. Brian C. Beckman ; Anthony D. Andrews ; Alexander A. Armanasu, Automatic object caller chain with declarative impersonation and transitive trust.
  24. Fang, Lijiang; Yuan, Hua, Change notification query multiplexing.
  25. Mahalingaiah, Rupaka; Kapadia, Viren H., Communication network across which packets of data are transmitted according to a priority scheme.
  26. Mahalingaiah, Rupaka; Kapadia, Viren H., Communication network having modular switches that enhance data throughput.
  27. Mahalingaiah, Rupaka, Communication network having packetized security codes and a system for detecting security breach locations within the network.
  28. Long, Joe Dennis, Compensating resource managers.
  29. Limprecht,Rodney T.; Helland,Patrick James; Agsen,Mohsen M., Component self-deactivation while client holds a returned reference.
  30. Andrews, Anthony D., Composable roles.
  31. Farber, David A.; Lachman, Ronald D., Computer file system using content-dependent file identifiers.
  32. Hunt, William J.; Neil, Edward James; Haber, Steven F.; Wood, Russell D., Computer implemented method and system for transmitting graphical images from server to client at user selectable resolution.
  33. Flannery Michael R., Computer power down upon emergency network notification.
  34. Michael R. Flannery, Computer power down upon emergency network notification.
  35. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  36. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  37. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  38. Seung-Ju Na KR, Computer system having remote wake-up function and remote wake-up method thereof.
  39. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Computerized access device with network security.
  40. Kunze, Aaron R.; Edwards, Jim W.; Dreke, Christian, Connections of nodes on different networks.
  41. Kunze, Aaron R.; Edwards, Jim W.; Dreke, Christian, Connections of nodes on different networks.
  42. Farber, David A.; Lachman, Ronald D., Controlling access to data in a data processing system.
  43. Stuntebeck, Erich, Controlling access to resources on a network.
  44. Saito, Makoto, Controlling database copyrights.
  45. Saito, Makoto, Controlling database copyrights.
  46. Saito, Makoto, Controlling database copyrights.
  47. Marshall, John; Rykowski, Adam; Stuntebeck, Erich; Halebeed, Jyothiprakash, Controlling distribution of resources in a network.
  48. Marshall, John; Stuntebeck, Erich; Jayaprakash, Gopinath; Manton, John Joseph; Brannon, Jonathan Blake, Controlling distribution of resources on a network.
  49. Reagan, Spencer Gibson; Manton, John Joseph, Controlling resources used by computing devices.
  50. Reagan, Spencer Gibson; Manton, John Joseph, Controlling resources used by computing devices.
  51. Juels,Ari; Brainard,John, Cryptographic countermeasures against connection depletion attacks.
  52. Ogg, Craig L.; Chow, William W., Cryptographic module for secure processing of value-bearing items.
  53. Ogg, Craig L.; Chow, William W., Cryptographic module for secure processing of value-bearing items.
  54. Ogg, Craig L.; Chow, William W., Cryptographic module for secure processing of value-bearing items.
  55. Cook, Jeffrey; Wu, Handong; Foster, Lindy, DNS server access control system and method.
  56. Dabbiere, Alan; Stuntebeck, Erich, Data communications management.
  57. Dabbiere, Alan; Stuntebeck, Erich, Data communications management.
  58. Saito, Makoto, Data copyright management.
  59. Saito, Makoto, Data copyright management.
  60. Saito, Makoto, Data copyright management system.
  61. Saito,Makoto, Data copyright management system.
  62. Saito, Makoto, Data management.
  63. Saito, Makoto, Data management system.
  64. Saito, Makoto, Data management system.
  65. Saito, Makoto, Data management system.
  66. Fukuda, Yasuo, Data management system, information processing apparatus, authentification management apparatus, method and storage medium.
  67. Helland Patrick James ; Limprecht Rodney ; Al-Ghosein Mohsen ; Reed David R. ; Devlin William D., Declarative and programmatic access control of component-based server applications using roles.
  68. Bandini, Jean-Christophe Denis; Odnert, Daryl, Delay technique in e-mail filtering system.
  69. Manton, John Joseph, Delegating authorization to applications on a client device in a networked environment.
  70. Manton, John Joseph; Kommireddy, Sridhara Babu; Rykowski, Adam Stephen, Delegating authorization to applications on a client device in a networked environment.
  71. Dalton, Christopher I., Demonstrating integrity of a compartment of a compartmented operating system.
  72. Jones, Kevin Brian; Pointon, Richard, Device internet resource access filtering system and method.
  73. Dabbiere, Alan, Device management macros.
  74. Saito, Makoto, Digital content management system and apparatus.
  75. Saito, Makoto, Digital content management system and apparatus.
  76. Saito, Makoto, Digital content management system and apparatus.
  77. San Andres, Ramon J.; Sanderman, David S.; Nolan, Sean P., Directory service for a computer network.
  78. Helland Patrick James ; Limprecht Rodney ; Al-Ghosein Mohsen, Disabling and enabling transaction committal in transactional application components.
  79. Schneider, David S.; Ribet, Michael B.; Lipstone, Laurence R.; Jensen, Daniel, Distributed administration of access to information and interface for same.
  80. San Andres,Ramon J.; Sanderman,David S.; Nolan,Sean P., Distributed directory service using junction nodes for providing network users with an integrated hierarchical directory services.
  81. Dabbiere, Alan; Stuntebeck, Erich, Distribution of variably secure resources in a networked environment.
  82. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  83. Desai, Saurabh; Koikara, George Mathew; Nataraj, Pruthvi Panyam; Venkataraman, Guha Prasad; Ranganathan, Vidya, Domain based access control of physical memory space.
  84. Desai, Saurabh; Koikara, George Mathew; Nataraj, Pruthvi Panyam; Venkataraman, Guha Prasad; Ranganathan, Vidya, Domain based isolation of network ports.
  85. Desai, Saurabh; Koikara, George Mathew; Nataraj, Pruthvi Panyam; Venkataraman, Guha Prasad; Ranganathan, Vidya, Domains based security for clusters.
  86. Wadlow Thomas A. ; Kevin Joseph P., Dynamic policy-based apparatus for wide-range configurable network service authentication and access control using a fixed-path hardware configuration.
  87. Keshav, Srinivasan; Sharma, Rosen; Chuang, Shaw, Dynamically modifying the resources of a virtual server.
  88. Keshav, Srinivasan; Sharma, Rosen; Chuang, Shaw, Dynamically modifying the resources of a virtual server.
  89. Keshav,Srinivasan; Sharma,Rosen; Chuang,Shaw, Dynamically modifying the resources of a virtual server.
  90. Dickinson, III,Robert D.; Krishnamurthy,Sathvik, E-mail firewall.
  91. Dickinson, III, Robert D.; Krishnamurthy, Sathvik, E-mail firewall with policy-based cryptosecurity.
  92. Dickinson, III, Robert D.; Krishnamurthy, Sathvik, E-mail firewall with stored key encryption/decryption.
  93. Dickinson, III,Robert D.; Krishnamurthy,Sathvik, E-mail firewall with stored key encryption/decryption.
  94. Thorne John ; Davis Marie L. ; Strauss Michael J., Electronic mail security.
  95. Newman, Peter; Goyal, Pawan, Enabling a service provider to provide intranet services.
  96. David E. Jones CA; Cormac M. O'Connell CA, Encryption processor with shared memory interconnect.
  97. Jones David E.,CAX ; O'Connell Cormac M.,CAX, Encryption processor with shared memory interconnect.
  98. Jones, David E.; O'Connell, Cormac M., Encryption processor with shared memory interconnect.
  99. Marshall, John, Enterprise-specific functionality watermarking and management.
  100. Marshall, John, Enterprise-specific functionality watermarking and management.
  101. Marshall, John, Enterprise-specific functionality watermarking and management.
  102. Blackmore, Robert; Treumann, Richard R.; White, Alison B., Establishing a communicator across multiple processes in a multithreaded computing environment.
  103. McDysan, Dave; Thomas, Howard Lee; Yao, Lei, External processor for a distributed network access system.
  104. McDysan, Dave; Thomas, Howard Lee; Yao, Lei, External processor for a distributed network access system.
  105. Goyal, Pawan; Keshav, Srinivasan, Fairly partitioning resources while limiting the maximum fair share.
  106. Haff, Maurice W.; Clarke, Christopher D., File transfer system.
  107. Haff,Maurice W.; Clarke,Christopher D., File transfer system.
  108. Haff, Maurice W.; Clarke, Christopher D., File transfer system for direct transfer between computers.
  109. Haff, Maurice W.; Clarke, Christopher D., File transfer system for direct transfer between computers.
  110. Haff Maurice W. ; Clarke Christopher D., File transfer system using dynamically assigned ports.
  111. Rose, Anthony, Filter for a distributed network.
  112. Rose, Anthony, Filter for a distributed network.
  113. Rose, Anthony, Filter for a distributed network.
  114. Wesinger ; Jr. Ralph E. ; Coley Christopher D., Firewall providing enhanced network security and user transparency.
  115. Liu, Changming; Cheung, Lee Chik, Firewall security between network devices.
  116. Liu, Changming; Cheung, Lee Chik, Firewall security between network devices.
  117. Thomas, Andrew J.; Watkiss, Neil Robert Tyndale; Schiappa, Daniel Salvatore; Ray, Kenneth D., Firewall techniques for colored objects on endpoints.
  118. Dabbiere, Alan; Stuntebeck, Erich, Functionality management via application modification.
  119. Dabbiere, Alan; Stuntebeck, Erich, Functionality management via application modification.
  120. Marshall, John, Functionality watermarking and management.
  121. Marshall, John, Functionality watermarking and management.
  122. Marshall, John; Stuntebeck, Erich, Functionality watermarking and management.
  123. Marshall, John; Stuntebeck, Erich, Functionality watermarking and management.
  124. Short, Joel E.; Ewan, Ray S.; Sorcsek, Jerome, Gateway device having an XML interface and associated method.
  125. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  126. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  127. Hannel,Clifford L.; Lipstone,Laurence R.; Schneider,David S., Generalized policy server.
  128. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  129. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  130. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  131. Gupta,Ramesh M.; Jain,Parveen K.; Amidon,Keith E.; Gong,Fengmin; Vissamsetti,Srikant; Haeffele,Steve M.; Raman,Ananth, Hierarchy-based method and apparatus for detecting attacks on a computer system.
  132. DiRico, John; Stuntebeck, Erich, Individual-specific content management.
  133. Nisbet, James Donald; Wiese, James Christopher; Reizes, David Alexander; Hoyt, Stephen Crosby, Inferring content sensitivity from partial content matching.
  134. Nisbet, James Donald; Wiese, James Christopher; Reizes, David Alexander; Hoyt, Stephen Crosby, Inferring document and content sensitivity from public account accessibility.
  135. Haeffele, Steven M.; Gupta, Ramesh M.; Raman, Ananth; Vissamsetti, Srikant, Integrated firewall, IPS, and virus scanner system and method.
  136. Haeffele, Steven M.; Gupta, Ramesh M.; Raman, Ananth; Vissamsetti, Srikant, Integrated firewall, IPS, and virus scanner system and method.
  137. Millsap, Donald W.; Becker, Edward C.; Reeves, Dwayne E.; Simpson, John; Mevis, Dan, Integrated voice and data system and auto retail channel network portal.
  138. Hoffman, Jr., Gene; Elrod, Mark B., Internet computer system with methods for dynamic filtering of hypertext tags and content.
  139. Limsico, Carl T., Internet server authentication client.
  140. Phillips,Robert S.; Davis,Scott H.; Dietterich,Daniel J.; Nyman,Scott E.; Porter,David, Internet-based shared file service with native PC client access and semantics.
  141. Phillips,Robert S.; Davis,Scott H.; Dietterich,Daniel J.; Nyman,Scott E.; Porter,David, Internet-based shared file service with native PC client access and semantics and distributed access control.
  142. Walsh Stephen Kelly, Intranet network system.
  143. McArdle, Mark J.; Johnston, Brent A., Intrusion prevention for active networked applications.
  144. Helland, Patrick James; Limprecht, Rodney; Al-Ghosein, Mohsen; Russell, Wilfred G.; Gray, Jan Stephen, Just-in-time activation and as-soon-as-possible deactivation or server application components.
  145. Szor,Peter, Kernel mode overflow attack prevention system and method.
  146. Epstein,Michael A., Key distribution via a memory device.
  147. Thomas, Andrew J.; Harris, Mark D.; Reed, Simon Neil; Watkiss, Neil Robert Tyndale; Ray, Kenneth D., Labeling computing objects for improved threat detection.
  148. Dabbiere, Alan; Marshall, John; Stuntebeck, Erich, Location-based configuration policy toggling.
  149. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  150. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  151. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  152. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  153. Edery, Yigal Mordechai; Vered, Nirmrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  154. Edery,Yigal Mordechai; Vered,Nimrod Itzhak; Kroll,David R., Malicious mobile code runtime monitoring system and methods.
  155. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  156. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  157. Cismas, Sorin N.; Kurian, Manu, Managing enterprise data movement using a heuristic data movement detection engine.
  158. Herbach, Jonathan D.; Koon, Betty Y., Mechanism for visible users and groups.
  159. Herbach, Jonathan D.; Koon, Betty Y., Mechanism for visible users and groups.
  160. McDysan, Dave; Thomas, Howard Lee; Yao, Lei, Message, control and reporting interface for a distributed network access system.
  161. Black, Robert Barth, Method and aparatus for presence based resource management.
  162. Wu,Shyhtsun Felix; Fei,Aiguo; Gong,Fengmin, Method and apparatus for adaptively classifying network traffic.
  163. Haff, Maurice W.; Clarke, Christopher D., Method and apparatus for data file transfer using destination linked directories.
  164. Haff, Maurice W.; Clarke, Christopher D., Method and apparatus for data file transfer using destination linked directories.
  165. Fei, Aiguo; Sun, Kai; Gong, Fengmin, Method and apparatus for detecting a distributed denial of service attack.
  166. Gupta, Ramesh M.; Jain, Parveen K.; Amidon, Keith E.; Gong, Fengmin; Vissamsetti, Srikant; Haeffele, Steve M.; Raman, Ananth, Method and apparatus for detecting intrusions on a computer system.
  167. Bu, Zheng; Gong, Fengmin, Method and apparatus for detecting shellcode.
  168. Kay, James, Method and apparatus for electronic mail filtering.
  169. Kay, James, Method and apparatus for electronic mail filtering.
  170. Kay, James, Method and apparatus for electronic mail filtering.
  171. Samar, Vipin; Lei, Chon Hei; Keefe, Thomas F., Method and apparatus for facilitating compartmentalized database user management.
  172. Abraham,Dalen M.; Barnes,Todd A.; Bouche,Paul F.; Bougetz,Thomas P.; Gosselin,Tracy A.; Grieve,Mark G.; Langdon,Brent A.; Allison,Robert C.; Nikkel,Michael S.; Rosove,Stuart, Method and apparatus for managing internetwork and intranetwork activity.
  173. Black, Robert Barth, Method and apparatus for presence based resource management.
  174. Saito, Makoto, Method and apparatus for protecting digital data by double re-encryption.
  175. Mahalingaiah, Rupaka, Method and apparatus for providing continuous user verification in a packet-based network.
  176. Anderson, Scott William, Method and apparatus for providing selective access to information.
  177. Baxter,Samuel C.; Colson,Thomas J., Method and apparatus for safeguarding files.
  178. Mahalingaiah, Rupaka, Method and apparatus for securing communication over public network.
  179. De La Bretoni챔re,Ralph Rogier, Method and device for protecting data communication.
  180. Rubin, Moshe; Matitya, Moshe; Melnick, Artem; Touboul, Shlomo; Yermakov, Alexander; Shaked, Amit, Method and system for adaptive rule-based content scanners.
  181. Rubin, Moshe; Matitya, Moshe; Melnick, Artem; Touboul, Shlomo; Yermakov, Alexander; Shaked, Amit, Method and system for adaptive rule-based content scanners for desktop computers.
  182. Touboul,Shlomo, Method and system for caching at secure gateways.
  183. Bandini,Jean Christophe Denis; Smith,Jeffrey C., Method and system for e-mail message transmission.
  184. Bandini,Jean Christophe Denis; Smith,Jeffrey C., Method and system for e-mail message transmission.
  185. Patton, Charles; Roschelle, Jeremy; Pea, Roy D.; Vahey, Phil, Method and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment.
  186. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Method and system for establishing a security perimeter in computer networks.
  187. Bandini, Jean-Christophe Denis; Smith, Jeffrey C., Method and system for messaging security.
  188. Bandini, Jean-Christophe Denis; Smith, Jeffrey C., Method and system for messaging security.
  189. Malan, Gerald R.; Jahanian, Farnam, Method and system for profiling network flows at a measurement point within a computer network.
  190. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Method and system for protecting a computer and a network from hostile downloadables.
  191. Shiloh, Dekel, Method and system for securing user identities and creating virtual users to enhance privacy on a communication network.
  192. Shiloh, Dekel, Method and system for securing user identities and creating virtual users to enhance privacy on a communication network.
  193. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for authenticating a user access request.
  194. Saito, Makoto, Method for controlling database copyrights.
  195. Saito,Makoto, Method for controlling database copyrights.
  196. Saito,Makoto, Method for controlling database copyrights.
  197. Vipin K. Jain, Method for detecting dedicated link between an end station and a network device.
  198. Ruane James ; Binder James S. ; Connery Glenn William ; Pickering Robert,GBX, Method for determining whether two pieces of network equipment are directly connected.
  199. Reisman, Richard R., Method for distributing a list of updated content to a user station from a distribution server wherein the user station may defer installing the update.
  200. Reisman, Richard R., Method for distributing content to a user station.
  201. Reisman, Richard R., Method for distributing content to a user station.
  202. Reisman, Richard R., Method for distributing content to a user station.
  203. San Andres,Ramon J.; Sanderman,David S.; Nolan,Sean P., Method for downloading an icon corresponding to a hierarchical directory structure from a directory service.
  204. Ylonen, Tatu, Method for packet authentication in the presence of network address translations and protocol conversions.
  205. Logigan, Mircea; Rochon, Peter, Method for providing remote management of computer systems.
  206. Angelo Michael F. ; Collins David L. ; Kim Donald D. ; Jansen Kenneth A., Method for securely communicating remote control commands in a computer network.
  207. Tatsuya Fujiyama JP; Makoto Kayashima JP; Masato Terada JP; Osamu Katsumata JP, Method of collectively managing dispersive log, network system and relay computer for use in the same.
  208. Cherepov, Mikhail, Method to control and secure setuid/gid executables and processes.
  209. Hartmann,Richard G.; Krissell,Daniel L.; Murphy, Jr.,Thomas E.; Orzel,Francine M.; Rieth,Paul F.; Stevens,Jeffrey S., Method, system and program product for dynamically detecting errant data sequences and performing corresponding actions.
  210. Maurice W. Haff ; Christopher D. Clarke, Methods and apparatus for secure electronic, certified, restricted delivery mail systems.
  211. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security for ad hoc networked computerized devices.
  212. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security over untrusted networks.
  213. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods of operating a portable communications device with enhanced security.
  214. Holden,James M.; Levin,Stephen E.; Nickel,James O.; Wrench,Edwin H., Methods of operating portable computerized device with network security.
  215. Corthell David, Methods, software, and apparatus for secure communication over a computer network.
  216. Holden, James M.; Levin, Stephen E.; Snow, David W.; Snow, legal representative, Mary; Wrench, Edwin H., Mixed enclave operation in a computer network.
  217. Kapadia, Viren H.; Mahalingaiah, Rupaka, Modular switches interconnected across a communication network to achieve minimal address mapping or translation between termination devices.
  218. Weller, Michael K.; Mangra, Tarachrand A.; Litzinger, Joseph A.; Shah, Sanket J., Multi-level secure (MLS) information network.
  219. Wolf, Bryan, Multi-party encryption systems and methods.
  220. Oliphant, Brett M.; Blignaut, John P., Multi-path remediation.
  221. Docter Eric E. ; Hofmann William D. ; Hurley Paul E., Multi-stage data filtering system employing multiple filtering criteria.
  222. Helland, Patrick James; Limprecht, Rodney; Al-Ghosein, Mohsen; Reed, David R., Multi-user server application architecture with single-user object tier.
  223. McDysan, Dave; Thomas, Howard Lee; Yao, Lei, Network access system including a programmable access device having distributed service control.
  224. McDysan,Dave; Thomas,Howard Lee; Yao,Lei, Network access system including a programmable access device having distributed service control.
  225. McDysan,Dave; Thomas,Howard Lee; Yao,Lei, Network access system including a programmable access device having distributed service control.
  226. Martin, Jean-Christophe; Duloutre, Sylvain, Network directory access mechanism.
  227. Mahalingaiah, Rupaka, Network packet transmission mechanism.
  228. Dowd,Alan; Markham,Thomas R.; Foote Lennox,Tomo; Apostal,David; Lu,Raymond, Network security modeling system and method.
  229. Alon Cohen IL, Network vaults.
  230. Andrews, Anthony D.; Thatte, Satish R.; Hill, Richard D.; Norlander, Rebecca A.; Armanasu, Alexander A., Object security boundaries.
  231. Anthony D. Andrews ; Satish R. Thatte ; Richard D. Hill ; Rebecca A. Norlander ; Alexander A. Armanasu, Object security boundaries.
  232. Stuntebeck, Erich; Brannon, Jonathan Blake, On-demand security policy activation.
  233. Stuntebeck, Erich; Brannon, Jonathan Blake, On-demand security policy activation.
  234. Grass,Norbert, PC-arrangement for visualisation, diagnosis and expert systems for monitoring, controlling and regulating high voltage supply units of electric filters.
  235. Komisky,Dennie, Packet filtering methods and systems.
  236. Komisky, Dennis, Packet filtering system and methods.
  237. Cabrera, Luis Felipe; Jones, Deborah C.; Pudipeddi, Ravisankar; Steiner, Stefan R., Partial migration of an object to another storage location in a computer system.
  238. Cabrera,Luis Felipe; Jones,Deborah C.; Pudipeddi,Ravisankar; Steiner,Stefan R., Partial migration of an object to another storage location in a computer system.
  239. Touboul, Shlomo, Policy-based caching.
  240. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Portable communications device with enhanced security.
  241. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Portable computerized device with network security.
  242. Amar, Anshul; Stone, Steve; Park, Ed; Park, Todd, Practice management and billing automation system.
  243. McDysan, Dave; Thomas, Howard Lee; Yao, Lei, Programmable access device for a distributed network access system.
  244. Arsenault, David Wayne; Dhimitri, William James, Protectable expressions in objects having authorable behaviors and appearances.
  245. Gupta,Ramesh M.; Jain,Parveen K.; Amidon,Keith E.; Gong,Fengmin; Vissamsetti,Srikant; Haeffele,Steve M.; Raman,Ananth, Protocol-parsing state machine and method of using same.
  246. Reisman, Richard R., Providing and receiving content over a wireless communication system.
  247. Goyal, Pawan; Huang, Xun Wilson; Keshav, Srinivasan; Sharma, Rosen, Providing quality of service guarantees to virtual hosts.
  248. Reisman, Richard R., Providing services from a remote computer system to a user station over a communications network.
  249. Reisman, Richard R., Providing services from a remote computer system to a user station over a communications network.
  250. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  251. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  252. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  253. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  254. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  255. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  256. Limprecht,Rodney T.; Helland,Patrick James; Agsen,Mohsen M., Recycling components after self-deactivation.
  257. Keshav, Srinivasan; Sharma, Rosen, Regulating file access rates according to file type.
  258. Keshav, Srinivasan; Sharma, Rosen, Regulating file access rates according to file type.
  259. Terada, Masato; Kayashima, Makoto; Kawashima, Takahiko; Fujiyama, Tetsuya; Koizumi, Minoru; Nishimura, Kazuo; Hirayama, Kazunari; Ogino, Takaaki, Repeater and network system utililzing the same.
  260. Terada Masato,JPX ; Kayashima Makoto,JPX ; Kawashima Takahiko,JPX ; Fujiyama Tetsuya,JPX ; Koizumi Minoru,JPX ; Nishimura Kazuo,JPX ; Hirayama Kazunari,JPX ; Ogino Takaaki,JPX, Repeater and network system utilizing the same.
  261. Nash, Alistair, Resource access filtering system and database structure for use therewith.
  262. Marshall, John; DeWeese, William, Resource watermarking and management.
  263. Sharma, Rosen; Keshav, Srinivasan, Restricting communication between network devices on a common network.
  264. Goyal, Pawan, Restricting communication of selected processes to a set of specific network addresses.
  265. Goyal,Pawan, Restricting communication of selected processes to a set of specific network addresses.
  266. Rajakarunanayake, Yasantha Nirmal, Secure access from a user location to multiple target systems with a simplified user interface.
  267. Ogg, Craig L., Secure and recoverable database for on-line value-bearing item system.
  268. Ogg, Craig L., Secure and recoverable database for on-line value-bearing item system.
  269. Toh, Eng Whatt; Teo, Kok Hoon, Secure and reliable document delivery using routing lists.
  270. Ho Andrew P., Secure database management system for confidential records using separately encrypted identifier and access request.
  271. Schneider David S. ; Lipstone Laurence R. ; Jensen Daniel ; Ribet Michael B., Secure delivery of information in a network.
  272. He, Liwen; Littlefair, Bryan; Martin, Thomas; Kallath, Dinesh; Rutherford, Christopher, Secure network architecture.
  273. Martin, Thomas; Rutherford, Christopher; He, Liwen; Littlefair, Bryan; Kallath, Dinesh, Secure network architecture.
  274. Weller, Michael K.; Canter, Jeffrey B., Secure network interface device.
  275. Hart ; Jr. Edward C. ; Kiernan Casey Lang ; Rajarajan Vij, Secure remote access computing system.
  276. Yarborough,William Jordan, Secured FTP architecture.
  277. Brannon, Jonathan Blake, Securely authorizing access to remote resources.
  278. Brannon, Jonathan Blake, Securely authorizing access to remote resources.
  279. Brannon, Jonathan Blake, Securely authorizing access to remote resources.
  280. Haff, Maurice W.; Clarke, Christopher D., Selective acceptance of electronic messages in communication systems.
  281. Limprecht, Rodney; Helland, Patrick James; Al-Ghosein, Mohsen, Server application components with control over state duration.
  282. Limprecht,Rodney; Helland,Patrick James; Al Ghosein,Mohsen, Server application components with control over state duration.
  283. Sample, Char, Server resource management, analysis, and intrusion negation.
  284. Sample,Char, Server resource management, analysis, and intrusion negation.
  285. Sample, Char, Server resource management, analysis, and intrusion negotiation.
  286. Marshall, John; DeWeese, William, Shared resource watermarking and management.
  287. Toh,Eng Whatt; Sim,Peng Toh, Simplified addressing for private communications.
  288. Boyles, Stephen L.; Leinecker, Richard C.; Fischer, Jochen E.; Moody, Jr., Clyde G.; McConnell, Troy; Wilkinson, Ken, Smart card controlled internet access.
  289. Boyles, Stephen L.; Leinecker, Richard C.; Fischer, Jochen E.; Moody, Jr., Clyde G.; McConnell, Troy; Wilkinson, Ken, Smart card controlled internet access.
  290. Sorensen, Christian Blake, Social media and data sharing controls for data security purposes.
  291. Reisman, Richard R., Software and method for monitoring a data stream and for capturing desired data within the data stream.
  292. Reisman, Richard R., Software and method that enables selection of on-line content from one of a plurality of network content service providers in a single action.
  293. Reisman, Richard R., Software and method that enables selection of one of a plurality of network communications service providers.
  294. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  295. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  296. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  297. Russell,Wilfred G.; Helland,Patrick J.; Hope,Greg; Limprecht,Rodney; Al Ghosein,Mohsen M.; Gray,Jan S., Software component execution management using context objects for tracking externally-defined intrinsic properties of executing software components within an execution environment.
  298. Russell,Wilfred G.; Helland,Patrick James; Hope,Greg; Limprecht,Rodney; Al Ghosein,Mohsen; Gray,Jan Stephen, Software component execution management using context objects for tracking externally-defined intrinsic properties of executing software components within an execution environment.
  299. Reisman, Richard R., Software distribution over a network.
  300. Gooderum Mark P. ; Vu Trinh Q. ; Andreas Glenn, System and method for achieving network separation.
  301. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  302. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  303. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  304. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J.; Mesdaq, Ali A., System and method for analyzing web content.
  305. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A., System and method for analyzing web content.
  306. Baddour, Victor L; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A, System and method for analyzing web content.
  307. Touboul Shlomo,ILX ; Gal Nachshon,ILX, System and method for attaching a downloadable security profile to a downloadable.
  308. Pagan, Florence C. I.; Short, Joel E., System and method for authorizing a portable communication device.
  309. Richard R. Viets ; David G. Motes ; Paula Budig Greve ; Wayne W. Herberg, System and method for controlling access to documents stored on an internal network.
  310. Viets, Richard R.; Motes, David G.; Greve, Paula Budig; Herberg, Wayne W., System and method for controlling access to documents stored on an internal network.
  311. Viets, Richard R.; Motes, David G.; Greve, Paula Budig; Herberg, Wayne W., System and method for controlling access to documents stored on an internal network.
  312. Reid Irving,CAX ; Minear Spencer, System and method for controlling interactions between networks.
  313. Sharp, Clifford F.; Dark, Susan P., System and method for detecting and eliminating IP spoofing in a data transmission network.
  314. Hubbard, Daniel Lyle; Ruskin, Dan, System and method for dynamic and real-time categorization of webpages.
  315. Burns,Dale; Palles,Theodore, System and method for email screening.
  316. Caronni, Germano; Gupta, Amit; Kumar, Sandeep; Markson, Tom R.; Schuba, Christoph L.; Scott, Glenn C., System and method for enabling scalable security in a virtual private network.
  317. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  318. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  319. Charas,Philippe, System and method for local policy enforcement for internet service providers.
  320. Yang,Xuechen, System and method for managing dynamic network sessions.
  321. Cavanaugh, Robert E., System and method for network edge data protection.
  322. Cavanaugh, Robert E., System and method for network edge data protection.
  323. Ng, Raymond K., System and method for permission administration using meta-permissions.
  324. Shlomo Touboul IL, System and method for protecting a client during runtime from hostile downloadables.
  325. Touboul Shlomo,ILX, System and method for protecting a client during runtime from hostile downloadables.
  326. Touboul Shlomo,ILX, System and method for protecting a computer and a network from hostile downloadables.
  327. Touboul, Shlomo, System and method for protecting a computer and a network from hostile downloadables.
  328. Dye Robert E. ; Sojoodi Omid, System and method for providing client/server access to graphical programs.
  329. Boebert, William E.; Rogers, Clyde O.; Andreas, Glenn; Hammond, Scott W.; Gooderum, Mark P., System and method for providing secure internetwork services via an assured pipeline.
  330. Boebert, William E.; Rogers, Clyde O.; Andreas, Glenn; Hammond, Scott W.; Gooderum, Mark P., System and method for providing secure internetwork services via an assured pipeline.
  331. Boebert,William E.; Rogers,Clyde O.; Andreas,Glenn; Hammond,Scott W.; Gooderum,Mark P., System and method for providing secure internetwork services via an assured pipeline.
  332. Lirov, Yuval; Lirov, Erez, System and method for providing secure transmission, search, and storage of data.
  333. Applegate John ; Romatoski Jeff, System and method for redirecting network traffic to provide secure communication.
  334. Mueller Marianne ; Connelly David, System and method for securing a program's execution in a network environment.
  335. Desai, Nimesh; Udani, Sanjay; Kimble, Jr., James David; Werges, Thomas P.; Richardson, David Dean; Gustafson, Jeffrey A., System and method for selective information exchange.
  336. Hubbard, Dan; Tse, Alan, System and method of analyzing web addresses.
  337. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  338. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  339. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  340. Hubbard, Dan, System and method of controlling access to the internet.
  341. Sutterfield, Brian D.; Atwater, Bradley T., System and method of protecting a system that includes unprotected computer devices.
  342. Freund,Gregor, System and methodology for providing community-based security policies.
  343. Baker, Lara H.; Bailey, David J., System for controlling movement of information using an information diode between a source network and a destination network.
  344. Kazuhira Tanno JP, System for performing remote operation between firewall-equipped networks or devices.
  345. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, System for providing security for ad hoc networked computerized devices.
  346. San Andres,Ramon J.; Sanderman,David S.; Nolan,Sean P., System for providing users an integrated directory service containing content nodes located in different groups of application servers in computer network.
  347. San Andres, Ramon J.; Sanderman, David S.; Nolan, Sean P., System for providing users with a filtered view of interactive network directory obtains from remote properties cache that provided by an on-line service.
  348. Smith, Debra, System providing methodology for consolidation of financial information.
  349. Motoyama,Tetsuro, System using Internet electronic mail for communicating status of a monitored device to a monitoring device.
  350. Motoyama,Tetsuro, System using an internet application for monitoring an image-forming device.
  351. Motoyama,Tetsuro, System using internet application for monitoring image-forming device and sharing device information among departments.
  352. Motoyama,Tetsuro, System using internet application for monitoring metering device and sharing metering information among departments.
  353. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  354. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  355. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  356. Kashyap, Rahul Chander, System, method and computer program product for detecting encoded shellcode in network traffic.
  357. Magdych, James S.; Rahmanovic, Tarik; McDonald, John R.; Tellier, Brock E., System, method and computer program product for risk assessment scanning based on detected anomalous events.
  358. Oliphant, Brett M.; Blignaut, John P., System, method, and computer program product for reporting an occurrence in different manners.
  359. Pagan, Florence C. I.; Short, Joel E., Systems and methods for authorizing, authenticating and accounting users having transparent computer access to a network using a gateway device.
  360. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  361. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  362. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  363. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  364. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  365. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathon Blake, Systems and methods for controlling email access.
  366. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathon Blake, Systems and methods for controlling email access.
  367. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathon Blake, Systems and methods for controlling email access.
  368. Stuntebeck, Erich, Systems and methods for controlling email access.
  369. Stuntebeck, Erich, Systems and methods for controlling email access.
  370. Stuntebeck, Erich; Dabbiere, David, Systems and methods for controlling email access.
  371. Stuntebeck, Erich; Dabbiere, David, Systems and methods for controlling email access.
  372. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for controlling user perceived connection speed.
  373. Sheymov, Victor I.; Turner, Roger B., Systems and methods for distributed network protection.
  374. Sheymov,Victor I.; Turner,Roger B., Systems and methods for distributed network protection.
  375. Sheymov,Victor I; Turner,Roger B, Systems and methods for distributed network protection.
  376. Sheymov,Victor I; Turner,Roger B, Systems and methods for distributed network protection.
  377. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  378. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  379. Wu, Winnie C.; Deem, Michael E.; Sheppard, Edward G.; Fang, Lijiang; Li, Jian; Taylor, Michael B., Systems and methods for interfacing application programs with an item-based storage platform.
  380. Sample, Char, Systems and methods for preventing intrusion at a web host.
  381. Sample,Char, Systems and methods for preventing intrusion at a web host.
  382. Robert F. Groshon ; L. Aaron Philipp ; Jason C. Stone, Systems and methods for preventing transmission of compromised data in a computer network.
  383. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  384. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  385. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing content and services on a network system.
  386. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  387. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  388. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  389. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  390. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  391. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  392. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  393. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  394. Short, Joel E; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing dynamic network authorization, authentication and accounting.
  395. Thompson, J. Patrick; Cameron, Kim; Acharya, Srinivasmurthy P.; Raman, Balan Sethu, Systems and methods for separating units of information manageable by a hardware/software interface system from their physical organization.
  396. Dart, Scott E.; Gibson, Bradley P.; Evans, Christopher A.; Hellyar, Paul S.; Vaschillo, Alexander; Platt, John C.; Glenner, Steve C.; Ballou, Nathaniel H., Systems and methods for the implementation of a digital images schema for organizing units of information manageable by a hardware/software interface system.
  397. Shah, Ashish, Systems and methods for the implementation of a synchronization schemas for units of information manageable by a hardware/software interface system.
  398. Shah, Ashish, Systems and methods for the implementation of a synchronization schemas for units of information manageable by a hardware/software interface system.
  399. Novik, Lev; Talius, Tomas; Wu, Yunxin; Zhou, Shaoyu, Systems and methods for the utilization of metadata for synchronization optimization.
  400. Short, Joel E.; Ewan, Ray S.; Sorcsek, Jerome, Systems and methods of communicating using XML.
  401. Pearson Mark P., Three tier financial transaction system with cache memory.
  402. Dabbiere, Alan; Marshall, John; Stuntebeck, Erich, Time-based configuration policy toggling.
  403. Dabbiere, Alan; Marshall, John; Stuntebeck, Erich, Time-based configuration profile toggling.
  404. Helland, Patrick James; Limprecht, Rodney; Al-Ghosein, Mohsen; Russell, Wilfred G., Transaction processing of distributed objects with declarative transactional attributes.
  405. Decker,David H.; Egeberg,Gerald W.; English,James F.; Parker,Gene S.; Zogg,Scott J. F., Translator terminal for two or more wireless networks.
  406. Hannel, Clifford Lee; May, Anthony, Tunneling using encryption.
  407. Ikudome, Koichiro; Yeung, Moon Tai, User specific automatic data redirection system.
  408. Roskind, James, Using trusted communication channel to combat user name/password theft.
  409. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Virtual host for protocol transforming traffic traversing between an IP-compliant source and non-IP compliant destination.
  410. Gupta,Ramesh M.; Jain,Parveen K.; Amidon,Keith E.; Gong,Fengmin; Vissamsetti,Srikant; Haeffele,Steve M.; Raman,Ananth, Virtual intrusion detection system and method of using same.
  411. Huang, Xun Wilson; Estan, Jr., Cristian; Keshav, Srinivasan, Virtualizing super-user privileges for multiple virtual processes.
  412. Huang,Xun Wilson; Estan,Cristian; Keshav,Srinivasan, Virtualizing super-user privileges for multiple virtual processes.
  413. Dabbiere, Alan; Stuntebeck, Erich, Watermarking detection and management.
  414. Harris, Scott C., Wireless network having multiple communication allowances.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로