$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Network access control system and process 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/00
출원번호 US-0771637 (1996-12-20)
발명자 / 주소
  • Willens Steven M.
출원인 / 주소
  • Livingston Enterprises, Inc.
대리인 / 주소
    Sterne, Kessler, Goldstein & Fox, P.L.L.C
인용정보 피인용 횟수 : 247  인용 특허 : 9

초록

An Internet access system (10) incorporates an access control subsystem (12), implemented with a communications server (14), one or more Remote Authentication Dial In User Service (RADIUS) servers (16), and a remote access server (18) in network 21. Users are connected to the network by dial-up conn

대표청구항

[ What is claimed is:] [19.] A system for controlling a user's access to a network, comprising:a network access server, coupled to the network, having storage for user filters and a list of permitted sites;network access server software implemented on said network access server that is configured to

이 특허에 인용된 특허 (9)

  1. Regnier Barbara Ann (Mazeppa MN) Youngers David Nicholas (Rochester MN), Client/server computer systems having control of client-based application programs, and application-program control mean.
  2. Levergood Thomas Mark ; Stewart Lawrence C. ; Morris Stephen Jeffrey ; Payne Andrew C. ; Treese George Winfield, Internet server access control and monitoring systems.
  3. Kingdon Kevin (Orem UT) Childers Randal Earl (Orem UT) Higley DeeAnne (Provo UT) Olds Dale R. (Sandy UT), Method and apparatus to secure digital directory object changes.
  4. Theimer Marvin M. (Mountain View CA) Nichols David A. (Mountain View CA) Terry Douglas B. (San Carlos CA), Method for delegating access rights through executable access control program without delegating access rights not in a.
  5. Sadovsky Vladimir (Kirkland WA), Method for providing access to independent network resources by establishing connection using an application programming.
  6. Harkins Larry E. (Rochester NY) Hayward Ken (North Brockport NY) Herceg Thomas J. (Pittsford NY) Levine Jonathan D. (Rochester NY) Parsons David M. (Victor NY), Recipient prioritized communication channel profiles.
  7. Johnson Donavon W. (Georgetown TX) Smith Todd A. (Austin TX), Remote authentication and authorization in a distributed data processing system.
  8. Baker Brenda Sue (Berkeley Heights NJ) Grosse Eric (Berkeley Heights NJ), System and method for database access control.
  9. Shwed Gil (Jerusalem ILX), System for securing inbound and outbound data packet flow in a computer network.

이 특허를 인용한 특허 (247)

  1. Hannel, Clifford Lee; May, Anthony, Access control.
  2. Shannon Steven, Access control of networked data.
  3. Patel, Rakesh; Nicholl, Mara; Harju, Lindsey, Access control system for implementing access restrictions of regulated database records while identifying and providing indicators of regulated database records matching validation criteria.
  4. Patel, Rakesh; Nicholl, Mara; Harju, Lindsey Greenwell, Access control system for implementing access restrictions of regulated database records while identifying and providing indicators of regulated database records matching validation criteria.
  5. Dujari Rajeev ; Canter Adriaan, Accessing content via installable data sources.
  6. Barker, Paul Andrew; Marson, Philip John, Apparatus and method for generating reports with masked confidential data.
  7. Roberts, Jr., Evans V., Apparatus and method for interrupting data transmissions.
  8. Jeyachandran, Suresh; Suda, Aruna Rohra; Wakai, Masanori; Fujii, Kenichi, Apparatus for accessing another apparatus to perform processing and method therefor, and memory medium in which such program is stored.
  9. Chau Wing Cheong ; Leu Darren ; Liu Tze-jian ; Nilakantan Chandy ; Pao Jeffrey Kaiping ; Sun Tsyr-Shya Joe ; Tai Wayming Daniel ; Wang Xiaohu, Architecture to support a single system image across multiple network access servers.
  10. Markham,Thomas R.; Bogle,Jessica J.; Payne, Jr.,Charles N., Associative policy model.
  11. Brownell, David, Authenticated firewall tunneling framework.
  12. Brownell,David, Authenticated firewall tunneling framework.
  13. Hofrichter, Klaus; Myers, Rob; Rafey, Richter A., Automated context-sensitive updating on content in an audiovisual storage system.
  14. Dujari Rajeev, Automatic cache synchronization.
  15. Christofferson, Frank C.; Miller, Edward M., Automatic teleconferencing control system.
  16. Zhang, Danpo; Cohen, Josh; Dujari, Rajeev; Ellerman, E. Castedo, Background cache synchronization.
  17. Chang Sih-Pin ; Feig Ephraim, Browsers for focused access of data.
  18. Wedeking, John K., Cellular device authorized user tracking systems and methods.
  19. Quayle, Roger Phillip; Jones, William John; Jones, Alan Edward, Cellular wireless internet access system using spread spectrum and internet protocol.
  20. Marceau, Stephen Michael; Jensen, Robert Leland; Smith, Daniel Victor; Herrin, Damon Leigh, Check image access system.
  21. Gerszberg, Irwin; Martin, Jeffrey S.; Oplinger, Thomas; Treventi, Philip Andrew; Walker, Hopeton S., Coaxial cable/twisted pair cable telecommunications network architecture.
  22. Verthein William ; Schoo Daniel L. ; Landry Todd, Communication access chassis with general purpose computing platform.
  23. Verthein, William; Schoo, Daniel L.; Landry, Todd, Communication access chassis with general purpose computing platform.
  24. Andrews,Gregory P.; Gibson,Kevin P., Component download selection mechanism for web browsers.
  25. Lotvin,Mikhail; Nemes,Richard Michael, Computer apparatus and methods supporting different categories of users.
  26. Poh, Lisuan; Roy, Alka, Conflict resolution and rule determination in a policy realization framework.
  27. Mathew,Ashvin J.; Vetrivel,Puhazholi; Jones,Brian; Zhang,Danpo; Abbott,Laurel S.; Paya,Cem; Dunn,Melissa, Consent mechanism for online entities.
  28. Wentker, Dave; Wong, Erick; Shenker, Gavin; Deibert, Doug, Contactless transaction.
  29. Shannon, Steven, Controlling client access to networked data based on content subject matter categorization.
  30. Jensen, Robert Leland; Smith, Daniel Victor, Database system and method for data acquisition and perusal.
  31. Jensen, Robert Leland; Smith, Daniel Victor, Database system and method for data acquisition and perusal.
  32. See, Michael E.; Bailey, John W.; Panza, Charles L.; Pikover, Yuri; Stone, Geoffrey C., Deterministic user authentication service for communication network.
  33. See, Michael E.; Bailey, John W.; Panza, Charles L.; Pikover, Yuri; Stone, Geoffrey C.; Goodwin, Michele Wright; Sangroniz, Robert Leon, Deterministic user authentication service for communication network.
  34. See, Michael E.; Bailey, John W.; Panza, Charles L.; Pikover, Yuri; Stone, Geoffrey C.; Wright Goodwin, Michele; Sangroniz, Robert Leon, Deterministic user authentication service for communication network.
  35. Jones, Kevin Brian; Pointon, Richard, Device internet resource access filtering system and method.
  36. Serena, Frank David, Device, method, and network system for replacing content.
  37. Keeler, James D.; Melendez, John R., Device-specific authorization at distributed locations.
  38. Keeler, James D.; Melendez, John R., Device-specific authorization at distributed locations.
  39. Schneider, David S.; Ribet, Michael B.; Lipstone, Laurence R.; Jensen, Daniel, Distributed administration of access to information and interface for same.
  40. Markham, Thomas R., Distributed firewall system and method.
  41. Shiiyama, Hirotaka, Document management system using an access-limited character train and password, and a method and computer-readable medium therefor.
  42. Kirsch,Steven T., Document retrieval system with access control.
  43. Dujari Rajeev, Dynamic network cache directories.
  44. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Dynamically modifying a toolbar.
  45. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Dynamically modifying a toolbar.
  46. Douvikas, James G.; Sheehy, Terry R.; McKay, Christopher W. T., E-service to manage contact information and track contact location.
  47. Shrader Theodore Jack London, Filter rule validation and administration for firewalls.
  48. Hegli, Ronald Bjorn; Lonas, Jr., Hal Case; Kester, Harold, Filtering techniques for managing access to internet sites or other software applications.
  49. Hegli,Ronald Bjorn; Lonas, Jr.,Hal Case; Kester,Harold, Filtering techniques for managing access to internet sites or other software applications.
  50. Marceau, Stephen M; Marceau, Randolph C; Smith, Daniel Victor; Herrin, Damon Leigh; Baker, Rebecca Joy; Carrillo, Hector Osvaldo, Financial statement and transaction image delivery and access system.
  51. Bruestle, Jeremy J.; Lillie, Terrance L., Fine grained access control for wireless networks.
  52. Short, Joel E.; Ewan, Ray S.; Sorcsek, Jerome, Gateway device having an XML interface and associated method.
  53. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  54. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  55. Nishimoto Atsushi,JPX ; Fuku Hirokuni,JPX ; Watanabe Minami,JPX, Information management system and apparatus using open network environment, and storage medium storing control program of apparatus and capable of being read by computer.
  56. Chau Wing Cheong ; Leu Darren ; Liu Tze-jian ; Nilakantan Chandy ; Pao Jeffrey Kaiping ; Sun Tsyr-Shya Joe ; Tai Wayming Daniel ; Wang Xiaohu, Integrated architecture to support a single system image across multiple network access servers.
  57. Frank B. Dancs ; James E. Zmuda, Internet service provider preliminary user registration mechanism provided by centralized authority.
  58. Leppisaari, Arto; Haruna, Adamu, Limiting access to network functions based on personal characteristics of the user.
  59. Low, Sydney Gordon, Link usage.
  60. Low, Sydney Gordon, Link usage.
  61. Ou, Xiao Dong; Tang, Wen Liang; Chen, Jiu Biao; Cai, Ying Xing, Malicious website identifying method and system.
  62. Oliver,David M.; Densmore, Jr.,William P.; Callahan,Michael J., Managing transactions on a network: four or more parties.
  63. Rowney, Kevin T.; Wolfe, Michael R.; Gopalakrishnan, Mythili; Fridman, Vitali, Mechanism to search information content for preselected data.
  64. Low, Sydney Gordon; Lang, William Dennis, Message processing system.
  65. Low, Sydney Gordon; Lang, William Dennis, Message processing system.
  66. Low, Sydney Gordon; Lang, William Dennis, Message processing system.
  67. Black, Robert Barth, Method and aparatus for presence based resource management.
  68. Jones, Christopher; Desjardins, Daren; Bothwell, Eric; Fontana, Alexander, Method and apparatus for automatically correlating related incidents of policy violations.
  69. Jones, Chris; Bothwell, Eric; Rowney, Kevin T., Method and apparatus for creating an information security policy based on a pre-configured template.
  70. Jones, Chris; Bothwell, Eric; Rowney, Kevin T., Method and apparatus for creating an information security policy based on a pre-configured template.
  71. Zoppas, Michel; Hermann, Jeremy; O'Raghallaigh, Conal; Bothwell, Eric; Fontana, Alexander, Method and apparatus for detecting policy violations in a data repository having an arbitrary data schema.
  72. Kay, James, Method and apparatus for electronic mail filtering.
  73. Kay, James, Method and apparatus for electronic mail filtering.
  74. Kay, James, Method and apparatus for electronic mail filtering.
  75. Charles L. Hartmann ; Glenwood Ray Clark, Method and apparatus for generating user-specified reports from radius information.
  76. Chen, Shigang; Wei, Liman, Method and apparatus for managing security policies on a network.
  77. Black, Robert Barth, Method and apparatus for presence based resource management.
  78. Liao Hanqing ; King Peter F. ; Martin ; Jr. Bruce K., Method and apparatus for providing access control to local services of mobile devices.
  79. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method and apparatus for providing fungible intercourse over a network.
  80. Amara, Satish; Freed, Michael, Method and apparatus for providing policy-based services for internal applications.
  81. Rowney, Kevin T.; Wolfe, Michael R.; Jones, Chris; Kessler, Dirk; Chen, Hai; Bothwell, Eric, Method and apparatus to define the scope of a search for information from a tabular data source.
  82. Jones, Chris; Chen, Hai; Ansanelli, Joseph; Wolfe, Michael R.; Rowney, Kevin T., Method and apparatus to report policy violations in messages.
  83. Vinati,Felice; Vinati,Samuele; Vinati,Matteo, Method and device for controlling the time which a user spends connected to a data communication network.
  84. Gregg,Richard L.; Giri,Sandeep; Goeke,Timothy C., Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network.
  85. Meehan, Patrick Carson; Price, Zachary Wisenbaker; Zambroski, Jr., Raymond Joseph; Frenchu, William Henry; Hickey, Shawn Patrick; White, Jesse Lee; Mohr, Anthony Allen; Gomsrud, Jeremy Wayne, Method and system for digital rights management of documents.
  86. Meehan, Patrick Carson; Price, Zachary Wisenbaker; Zambroski, Jr., Raymond Joseph; Frenchu, William Henry; Hickey, Shawn Patrick; White, Jesse Lee; Mohr, Anthony Allen; Gomsrud, Jeremy Wayne, Method and system for digital rights management of documents.
  87. Meehan, Patrick Carson; Price, Zachary Wisenbaker; Zambroski, Jr., Raymond Joseph; Frenchu, William Henry; Hickey, Shawn Patrick; White, Jesse Lee; Mohr, Anthony Allen; Gomsrud, Jeremy Wayne, Method and system for digital rights management of documents.
  88. Pigin, Vlad, Method and system for digital rights management of documents.
  89. Pigin, Vlad, Method and system for digital rights management of documents.
  90. Pigin, Vlad, Method and system for digital rights management of documents.
  91. Dujari,Rajeev, Method and system for directory balancing.
  92. Guha Aloke, Method and system for efficiently storing web pages for quick downloading at a remote device.
  93. Guha,Aloke, Method and system for efficiently storing web pages for quick downloading at a remote device.
  94. Bedell,Jeffrey A.; Boysko,Glenn J.; Carranza,Eduardo; Hurwood,William; Li,Benjamin Z.; Sahasrabudhe,Sadanand; Saylor,Michael J.; Trundle,Steven S.; Warikoo,Abhimanyu; Yuan,Jun, Method and system for implementing security filters for reporting systems.
  95. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method and system for managing access to protected computer resources provided via an internet protocol network.
  96. Cunningham Mark,GBX ; Trevarrow Andrew,GBX, Method and system for monitoring and controlling network access.
  97. Fink,Ian M., Method and system for providing network access and services using access codes.
  98. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method for accessing a digital network by way of one or more Internet service providers.
  99. Nuttall, François Xavier, Method for computer network operation providing basis for usage fees.
  100. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  101. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  102. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  103. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  104. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  105. Gmuender, John Everett; Selgas, Thomas Drennan; Massing, Michael Brian, Method for providing a network address.
  106. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method of accessing a selected network.
  107. Yoon Chang Woo,KRX ; Kim Young Hoon,KRX ; Kim Dae Ung,KRX, Method of authenticating and charging a client using a web infoshop service system.
  108. Rosenzweig, Michael D., Method of caching web resources.
  109. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method of connecting a user to a network.
  110. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method of modifying a toolbar.
  111. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method of modifying a toolbar.
  112. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method of obtaining a network address.
  113. Serena, Frank David, Method of replacing content.
  114. Araki Hidenori,JPX ; Kusumoto Kiyoshi,JPX ; Nomura Susumu,JPX ; Yamashita Yasuhiro,JPX, Method of restricting data access to WWW server so as to permit specific user to refer to successive pages while entrance page is freely acquired by any user.
  115. Coss Michael John ; Majette David L. ; Sharp Ronald L., Methods and apparatus for a computer network firewall with cache query processing.
  116. Shafiee,Mohammad Reza; Subramanian,Sankar, Methods and apparatus for providing agent controlled synchronized browsing at a terminal.
  117. Shafiee,Mohammad Reza; Subramanian,Sankar, Methods and apparatus for providing agent controlled synchronized browsing at a terminal.
  118. Shafiee, Mohammad Reza; Subramanian, Sankar, Methods and apparatus for providing live agent assistance.
  119. Cox, David E.; Fletcher, James Corvin; Lindquist, David Bruce; Kessler, Carl S., Methods, systems and computer program products for policy based network control of characteristics of user sessions.
  120. Shenker, Gavin; Wentker, David; Deibert, Douglas; Wong, Erick, Mobile device with disabling feature.
  121. Shenker, Gavin; Wentker, David; Deibert, Douglas; Wong, Erick, Mobile device with disabling feature.
  122. Deibert, Doug; Wong, Erick; Shenker, Gavin; Wentker, David, Mobile phone payment with disabling feature.
  123. Haughn, Erick; Flynn, Judson John; Lewis, John, Mobile subscriber device network access.
  124. Tamura, Noriko, Mobile telephone apparatus with remote access function for external network and remote access method for mobile communication system.
  125. Ogram Mark E., Monitoring and regulatory system for the internet.
  126. Williams,Timothy C., Multi-level security network system.
  127. Terzis, Andreas; Murgia, Marco A.; Baskaran, Ashwin, Multilayer access control security system.
  128. Roy, Paul; Al-Azzawe, Khalid; Carter, Cale; Chitnis, Ambarish; Hawes, Richard Masao, Network access control based on program state.
  129. Parker,Benjamin J.; Werner,Shane W.; Diaz,Charles; Frederick,Terry M., Network security services architecture.
  130. Gerszberg Irwin ; Huang Kenny Xiaojian ; Kwabi Christopher K. ; Martin Jeffrey S. ; Miller ; II Robert Raymond ; Russell Jesse Eugene, Network server platform for internet, JAVA server and video application server.
  131. Voit, Eric A.; Balkovich, Edward E.; Goodman, William D.; Gadre, Jayant G.; White, Patrick E.; Young, David E., Network session management for telephony over hybrid networks.
  132. Alon Cohen IL, Network vaults.
  133. Baumgartner, Yoanna; Elman, Anna; Harris, Glen Douglas, Non-uniform memory access (NUMA) data processing system that holds and reissues requests at a target processing node in response to a retry.
  134. Serena, Frank David, Observation device, method, and computer program product for replacing content.
  135. Mathew,Ashvin J.; Beilinson,Craig A.; Evans,Christopher A.; Fravert,Harry J. W.; Safa,Ahmad H.; Hong,Linda I.; Tan,Victor; Abbott,Laurel S., Parental controls customization and notification.
  136. Dujari Rajeev, Partial file caching and read range resume system and method.
  137. Rowney, Kevin T.; Wolfe, Michael R.; Gopalakrishnan, Mythili; Fridman, Vitall A., Personal computing device-based mechanism to detect preselected data.
  138. Bleuse Patrice,FRX ; Lapierre Martine,FRX, Personalizing access to the internet via an access network and an internet service provider using an internet subscriber profile.
  139. Ruckmann, Peter; Manske, Detlef; Frerich, Stefan, Program parameter updating method.
  140. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  141. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  142. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  143. Bowman-Amuah, Michel K., Relationship management in an E-commerce application framework.
  144. Nash, Alistair, Resource access filtering system and database structure for use therewith.
  145. Damick, Jeffrey Joseph; Cunningham, Sean, Router-host logging.
  146. Ashdown Mike ; Lynchard Steve, SS7 firewall system.
  147. Rowney, Kevin T., Secure and scalable detection of preselected data embedded in electronically transmitted messages.
  148. Dusenbury ; Jr. Richard G., Secure network architecture method and apparatus.
  149. Dusenbury, Jr.,Richard G., Secure network architecture method and apparatus.
  150. Gampper James Michael ; Wolfe Daniel Charles, Selective internet request caching and execution system.
  151. Raman, Shree; Ferguson, John Gerald; Wootton, Bruce Christopher; Wyatt, Timothy Michael; Chen, Hai, Selective removal of protected content from web requests sent to an interactive website.
  152. Raman, Shree; Ferguson, John Gerald; Wootton, Bruce Christopher; Wyatt, Timothy Micheal; Chen, Hai, Selective removal of protected content from web requests sent to an interactive website.
  153. Doyle, Thomas F., Separable billing for personal data services.
  154. Dean Jeffrey Randell ; Rodriguez Ingrid Milagros, Server and computer network that permit a client to be easily introduced into the computer network.
  155. Boyles, Stephen L.; Leinecker, Richard C.; Fischer, Jochen E.; Moody, Jr., Clyde G.; McConnell, Troy; Wilkinson, Ken, Smart card controlled internet access.
  156. Boyles, Stephen L.; Leinecker, Richard C.; Fischer, Jochen E.; Moody, Jr., Clyde G.; McConnell, Troy; Wilkinson, Ken, Smart card controlled internet access.
  157. Pandya, Suketu J.; Lakshmanan, Hariharan, Software, systems and methods for managing a distributed network.
  158. Pandya,Suketu J.; Joshi,Varad V., Software, systems and methods for managing a distributed network.
  159. Tommy Alcendor ; Zygmunt A. Lozinskie GB; Baiju D. Mandalia, Speaker verification for authorizing updates to user subscription service received by internet service provider (ISP) using an intelligent peripheral (IP) in an advanced intelligent network (AIN).
  160. Chau Wing Cheong ; Leu Darren ; Liu Tze-jian ; Nilakantan Chandy ; Pao Jeffrey Kaiping ; Sun Tsyr-Shya Joe ; Tai Wayming Daniel ; Wang Xiaohu, Supporting load sharing across multiple network access servers.
  161. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  162. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  163. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  164. Kester,Harold; Ruskin,Dan; Lee,Chris; Anderson,Mark, System and method for adapting an internet filter.
  165. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J.; Mesdaq, Ali A., System and method for analyzing web content.
  166. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A., System and method for analyzing web content.
  167. Baddour, Victor L; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A, System and method for analyzing web content.
  168. Barnabo, Christopher E.; Greenlee, Gordan G., System and method for authentication to an application.
  169. Barnabo,Christopher E.; Greenlee,Gordan G., System and method for authentication to an application.
  170. Pagan, Florence C. I.; Short, Joel E., System and method for authorizing a portable communication device.
  171. Lau, Clement; Rafey, Richter A.; Gauba, Ravi; Wang, Annie; Hofrichter, Klaus, System and method for common interest analysis among multiple users.
  172. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  173. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  174. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  175. Hubbard, Daniel Lyle; Ruskin, Dan, System and method for dynamic and real-time categorization of webpages.
  176. Pollet, Cody; Burgess, Charles; Roach, Courtney; Hart, Brandon, System and method for enhanced data protection.
  177. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  178. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  179. Chen, Shun; Dandliker, Richard Bruce; DiCorpo, Phillip; Wootton, Bruce Christopher; Kessler, Dirk; Wyatt, Timothy Micheal, System and method for identity consolidation.
  180. Charas,Philippe, System and method for local policy enforcement for internet service providers.
  181. Angelo Michael F. ; Olarig Sompong P. ; Wooten David R. ; Driscoll Dan J., System and method for performing secure device communications in a peer-to-peer bus architecture.
  182. Keeler, James D.; Fink, Ian M.; Krenzer, Matthew M., System and method for user access to a distributed network communication system using persistent identification of subscribers.
  183. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, System and method of accessing a network by way of different service providers.
  184. Hubbard, Dan; Tse, Alan, System and method of analyzing web addresses.
  185. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  186. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  187. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  188. Hubbard, Dan, System and method of controlling access to the internet.
  189. Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph; Kester, Harold M., System and method of monitoring and controlling application files.
  190. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  191. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  192. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  193. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  194. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  195. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  196. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  197. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  198. Kester, Harold M.; Kester Jones, legal representative, Nicole; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  199. Kester,Harold M.; Hegli,Ronald B.; Dimm,John Ross; Anderson,Mark Richard, System and method of monitoring and controlling application files.
  200. Oliver, David M.; Densmore, William P.; Callahan, Michael J., System for management of alternatively priced transactions on network.
  201. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., System for managing access to protected computer resources.
  202. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  203. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  204. Schweitzer, Limor; Wagner, Eran; Givoly, Tal, System, method and computer program product for constructing a network-based filtering and aggregating platform.
  205. Schweitzer, Limor; Wagner, Eran; Givoly, Tal, System, method and computer program product for merging data in a network-based filtering and aggregating platform.
  206. Pagan, Florence C. I.; Short, Joel E., Systems and methods for authorizing, authenticating and accounting users having transparent computer access to a network using a gateway device.
  207. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for controlling user perceived connection speed.
  208. Kenny, Shane; Kenny, Aaron, Systems and methods for delegation and notification of administration of internet access.
  209. Kenny, Shane; Kenny, Aaron, Systems and methods for delegation and notification of administration of internet access.
  210. Catanzano, M. Bernard, Systems and methods for determining anti-virus protection status.
  211. Catanzano,M. Bernard, Systems and methods for determining anti-virus protection status.
  212. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  213. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  214. Staats, Robert T.; Young, Clifford H., Systems and methods for managing a network.
  215. Staats, Robert T.; Young, Clifford H., Systems and methods for managing a network.
  216. Staats, Robert T.; Young, Clifford H., Systems and methods for managing a network.
  217. Poh, Lisuan; Roy, Alka, Systems and methods for performing conflict resolution and rule determination in a policy realization framework.
  218. Stack, Brian; Lientz, Andrew; Chamberlain, Simon; Abdous, Yacine; Kahn, Ray, Systems and methods for providing anonymized user profile data.
  219. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  220. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  221. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing content and services on a network system.
  222. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  223. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  224. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  225. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  226. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  227. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  228. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  229. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  230. Short, Joel E; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing dynamic network authorization, authentication and accounting.
  231. Woods,Jonathan; Wynne,Ed, Systems and methods for site access.
  232. Short, Joel E.; Ewan, Ray S.; Sorcsek, Jerome, Systems and methods of communicating using XML.
  233. Zimowski, Melvin Richard, Technique for ensuring authorized access to the content of dynamic web pages stored in a system cache.
  234. Christofferson,Frank C.; Miller,Edward M., Teleconferencing bridge with EdgePoint mixing.
  235. Lotvin, Mikhail; Nemes, Richard M., Tracking points related to a user account for online redemption.
  236. Luckenbaugh Gary L. ; Stoakes Forrest E., Trusted services broker for web page fine-grained security labeling.
  237. Hannel, Clifford Lee; May, Anthony, Tunneling using encryption.
  238. Dulai Dharmender S. ; Marur Vinod R. ; Vitale Benjamin F. ; Zenel Bruce A., Two-tier authentication system where clients first authenticate with independent service providers and then automatically exchange messages with a client controller to gain network access.
  239. Jones, William John; Bowring, Michael, Use of internet web technology to register wireless access customers.
  240. Williams, Andrew, Use of radius in UMTS to perform accounting functions.
  241. Fink, Ian M.; Keeler, James D., User fraud detection and prevention of access to a distributed network communication system.
  242. Ikudome, Koichiro; Yeung, Moon Tai, User specific automatic data redirection system.
  243. Criddle, Linda; Milstein, David, Voice over internet protocol (VoIP) management.
  244. Harris, Scott C., Wireless network having multiple communication allowances.
  245. Meier, Robert; Griswold, Victor, Wireless security system and method.
  246. Meier,Robert; Griswold,Victor, Wireless security system and method.
  247. Henry N. Holtzman ; Jeff Mock, Wireless transceiver for communicating with tags.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로