$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Multilayer firewall system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/00
출원번호 US-0865482 (1997-05-29)
발명자 / 주소
  • Nessett Danny M.
  • Sherer William Paul
출원인 / 주소
  • 3Com Corporation
대리인 / 주소
    Richardson
인용정보 피인용 횟수 : 695  인용 특허 : 5

초록

A system provides for establishing security in a network that include nodes having security functions operating in multiple protocol layers. Multiple network devices, such as remote access equipment, routers, switches, repeaters and network cards having security functions are configured to contribut

대표청구항

[ We claim:] [1.] A system providing multiple protocol layer security in a network including nodes of a plurality of network device types, with nodes in a set of the nodes in the network including security functions executing in response to configuration data adapted for the corresponding type of no

이 특허에 인용된 특허 (5)

  1. Boyle John M. (Cranford NJ) Maiwald Eric S. (Southfields NY) Snow David W. (Convent Station NJ), Apparatus and method for providing multi-level security for communication among computers and terminals on a network.
  2. Herbison B. J. (Clinton MA) Lyman Carter (Merrimack NH) Karger Paul (Acton MA) Mann Bruce (Mason NH) Lipner Steve (Wellesley MA) Miller Arnold (Austin TX), Apparatus and method for secure transmission of data over an unsecure transmission channel.
  3. Dunne James W. ; Lasic Igor, Forwarding internetwork packets by replacing the destination address.
  4. Wied William J. ; Loa Kanchei, System and method of communicating between trusted and untrusted computer systems.
  5. Shwed Gil (Jerusalem ILX), System for securing inbound and outbound data packet flow in a computer network.

이 특허를 인용한 특허 (695)

  1. Pandya, Ashish A., 100GBPS security and search architecture using programmable intelligent search memory.
  2. Wilkinson, Christopher Thomas; Francovich, Edward Allen; Rodriguez, Jose Luis, Access control center auto configuration.
  3. Wilkinson, Christopher Thomas; Francovich, Edward Allen; Scott, Jeremy Ryan; Sternitzke, Steven Dale, Access control center auto launch.
  4. Wilkinson, Christopher Thomas; Francovich, Edward Allen; Scott, Jeremy Ryan; Sternitzke, Steven Dale, Access control center auto launch.
  5. Wilkinson, Christopher Thomas; Francovich, Edward Allen; Scott, Jeremy Ryan; Sternitzke, Steven Dale, Access control center auto launch.
  6. Wilkinson, Christopher Thomas; Francovich, Edward Allen, Access control center workflow and approval.
  7. Abrams,Roger Kenneth, Additional layer in operating system to protect system from hacking.
  8. Gude, Natasha; Sevinc, Soner; Ganichev, Igor; Chalvadi, Anuprem, Address grouping for distributed service rules.
  9. Sassi, Massimo; Garofalo, Angelo; Faure Ragani, Alessandro; Aiello, Alessandro Michele; Vercellone, Vinicio, Admission control in a telecommunication network.
  10. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Anonymous location service for wireless networks.
  11. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Anonymous location service for wireless networks.
  12. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Anonymous location service for wireless networks.
  13. Srivastava, Gita; Srivastava, Piyush B., Apparatus and method for enhancing security of data on a host computing device and a peripheral device.
  14. Srivastava, Gita; Srivastava, Piyush B., Apparatus and method for enhancing security of data on a host computing device and a peripheral device.
  15. Doviak, William; Whitmore, David L.; Houvig, Flex, Apparatus and method for intelligent routing of data between a remote device and a host system.
  16. Bowers, John Joseph; Peterson, Matthew T, Apparatus, systems and methods to provide authentication services to a legacy application.
  17. Bharadhwaj, Rajeev; Gupta, Ajit; Nagaraj, Ashwath, Application acceleration as a service system and method.
  18. Bharadhwaj, Rajeev; Gupta, Ajit; Nagaraj, Ashwath, Application acceleration as a service system and method.
  19. Ben-Itzhak, Yuval, Application layer security method and system.
  20. Borland, David; Schnell, Arnold Thomas; Davis, Mark, Arbitrating usage of serial port in node card of scalable and modular servers.
  21. Graves, Alan F.; Hobbs, Christopher W. L., Architectures for communication networks.
  22. Markham,Thomas R.; Bogle,Jessica J.; Payne, Jr.,Charles N., Associative policy model.
  23. Samuels, Allen R.; Sutter, Paul G.; Plamondon, Robert D., Automatic LAN/WAN port detection.
  24. Samuels, Allen R.; Sutter, Paul G., Automatic detection and window virtualization for flow control.
  25. Samuels, Allen R.; Sutter, Paul G., Automatic detection and window virtualization for flow control.
  26. Poling, Robert; Pugh, Richard S., Automatic discovery of users associated with screen names.
  27. Mohaban, Shai; Parnafes, Itzhak, Automatically applying bi-directional quality of service treatment to network data flows.
  28. Mohaban,Shai; Parnafes,Itzhak, Automatically applying bi-directional quality of service treatment to network data flows.
  29. McArdle, Mark J.; Johnston, Brent A.; Nathan, Philip D. R.; Dool, James, Automatically configuring a computer firewall based on network connection.
  30. Boulanger, Alan D.; Danford, Robert W.; Himberger, Kevin D.; Jeffries, Clark D.; Singh, Raj K., Automatically detecting malicious computer network reconnaissance by updating state codes in a histogram.
  31. Boulanger,Alan D.; Danford,Robert W.; Himberger,Kevin D.; Jeffries,Clark D.; Singh,Raj K., Automatically detecting malicious computer network reconnaissance by updating state codes in a histogram.
  32. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Automatically reconnecting a client across reliable and persistent communication sessions.
  33. John K. Ahlstrom ; Stephen I. Schleimer, Automatically verifying the feasibility of network management policies.
  34. Zavalkovsky, Arthur; Leibman, Nira, Basic command representation of quality of service policies.
  35. Lloyd Brian ; McGregor Glenn, Centralized authentication, authorization and accounting server with support for multiple transport protocols and multiple client types.
  36. Robinson, Kyle Lane; Bowers, John Joseph, Centralized user authentication system apparatus and method.
  37. Flury, Andrew; Banister, Scott; Sprosts, Craig; Peterson, Patrick R.; Olivier, Michael V., Collecting, aggregating, and managing information relating to electronic messages.
  38. Ito, Yuji; Kuranari, Shinichi; Ochiai, Hironori; Oda, Masaya, Communications system with security checking functions for file transfer operation.
  39. Ho Randall S. ; Latham Richard D. ; Meenakshi Srikanth S., Concurrent server and method of operation having client-server affinity using exchanged client and server keys.
  40. Jain, Kapil; Letchworth, Charles M.; McDonnell, Neal; Movassaghi, Yassin; Puvvala, Sukumar; Ward, David D., Configuration commit database approach and session locking approach in a two-stage network device configuration process.
  41. Jaisinghani, Devendra Rajkumar, Configuring a service based on manipulations of graphical representations of abstractions of resources.
  42. Garg, Neeraj; Brewer, Jason; Panasyuk, Anatoliy, Configuring security mechanisms utilizing a trust system.
  43. Crawford, William Jeffrey, Content filtering of remote file-system access protocols.
  44. Colby, Logan M.; Frey, Jeffrey A.; High, Robert H.; Vignola, Christopher P., Context-based dynamic policy assignment in a distributed processing environment.
  45. Flewallen, Steven Adams; Johnson, David Nephi; Burch, Lloyd Leon; Fjeldsted, Benjamin Clark; Beus, David Kent; Sriram, Thiruvarangam Viswanathan, Control of communication ports of computing devices using policy-based decisions.
  46. Flewallen, Steven Adams; Johnson, David Nephi; Burch, Lloyd Leon; Fjeldsted, Benjamin Clark; Beus, David Kent; Sriram, Thiruvarangam Viswanathan, Control of communication ports of computing devices using policy-based decisions.
  47. Zhuge, John; Mu, Paul Yuedong, Controlling access to storage resources by using access pattern based quotas.
  48. Richmond,James; Kjendal,David L., Controlling concurrent usage of network resources by multiple users at an entry point to a communications network based on identities of the users.
  49. Rubin, Shai A.; Dinerstein, Yosef; Hudis, Efim; Helman, Yair; Barash, Uri; Friedman, Arie, Controlling malicious activity detection using behavioral models.
  50. Rubin, Shai A.; Dinerstein, Yosef; Hudis, Efim; Helman, Yair; Barash, Uri; Friedman, Arie, Controlling malicious activity detection using behavioral models.
  51. Rubin, Shai A.; Dinerstein, Yosef; Hudis, Efim; Helman, Yair; Barash, Uri; Friedman, Arie, Controlling malicious activity detection using behavioral models.
  52. Richmond, James; Dunigan, Paula Jane; Kjendal, David L.; Pettit, Steven A., Controlling usage of network resources by a user at the user's entry point to a communications network based on an identity of the user.
  53. Beers, Ted W; Gorzynski, Mark E; Wickes, William C; Brewster, Jon A; Gargan, Garrett Daniel; Thielman, Jeffrey L; Grasley, Scott, Converting data from a first network format to non-network format and from the non-network format to a second network format.
  54. Pettit, Steven A.; Roese, John; Dunigan, Paula Jane; Richmond, James, Creating, modifying and storing service abstractions and role abstractions representing one or more packet rules.
  55. Cooper, Geoffrey; Sherlock, Kieran G.; Shaw, Bob; Valente, Luis, Credential/condition assertion verification optimization.
  56. Pandya, Ashish A., Data processing system using internet protocols.
  57. Krumel, Andrew K., Data protection system selectively altering an end portion of packets based on incomplete determination of whether a packet is valid or invalid.
  58. Muhlestein,Mark, Decentralized appliance virus scanning.
  59. Muhlestein, Mark, Decentralized virus scanning for stored data.
  60. Valente,Luis Filipe Pereira; Cooper,Geoffrey Howard; Shaw,Robert Allen; Sherlock,Kieran Gerard, Declarative language for specifying a security policy.
  61. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Delegated administration for a distributed security system.
  62. Sun, Jiong; Gopal, Niraj; Raju, Satyanarayana; Ramamoorthy, Sai V.; Yerneni, Prasad; Ward, David D., Deploying network element management system provisioning services.
  63. de Vries, Jeffrey; Hitomi, Arthur S., Deriving component statistics for a stream enabled application.
  64. de Vries, Jeffrey; Hitomi, Arthur Shingen, Deriving component statistics for a stream enabled application.
  65. Harp, Steven Alex; Haigh, J Thomas; Gohde, Johnathan A; O'Brien, Richard C; Payne, Jr., Charles N; VanRiper, Ryan A, Device for preventing, detecting and responding to security threats.
  66. Jones, Kevin Brian; Pointon, Richard, Device internet resource access filtering system and method.
  67. Poletto, Massimiliano Antonio; Kohler, Jr., Edward W., Device to protect victim sites during denial of service attacks.
  68. Keeler, James D.; Melendez, John R., Device-specific authorization at distributed locations.
  69. Keeler, James D.; Melendez, John R., Device-specific authorization at distributed locations.
  70. Chang, William Ho; Liu, Christina Ying, Digital content services or stores over the internet that transmit or stream protected or encrypted digital content to connected devices and applications that access the digital content services or stores.
  71. Jiao,Fan, Directory-enabled network elements.
  72. Peterson, Matthew T.; Webb, Jeff Marsden, Disconnected credential validation using pre-fetched service tickets.
  73. Peterson, Matthew T.; Webb, Jeff Marsden, Disconnected credential validation using pre-fetched service tickets.
  74. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Distributed enterprise security system.
  75. Roberts, David A., Distributed firewall implementation and control.
  76. Markham, Thomas R., Distributed firewall system and method.
  77. Stewart, Brett B.; Thompson, James; McClelland, Kathleen E., Distributed network communication system to provide wireless access to a computing device at a reduced rate.
  78. Pandya, Ashish A., Distributed network security system and a hardware processor therefor.
  79. Pandya,Ashish A., Distributed network security system and a hardware processor therefor.
  80. Gomi, Hidehito; Fujita, Satoru, Distributed system, access control process and apparatus and program product having access controlling program thereon.
  81. Newstadt, Keith G.; Lin, David T.; Guavin, William J., Distributed traffic scanning through data stream security tagging.
  82. Lum, Stacey C., Dynamic address assignment for access control on DHCP networks.
  83. Lum, Stacey C., Dynamic address assignment for access control on DHCP networks.
  84. Wang, Song; Deng, Suiqiang; Xu, Wilson; Walter, Martin, Dynamic address policy enforcement.
  85. Tindal,Glen D.; Schenk,Jeffery A., Dynamic configuration of network devices to enable data transfers.
  86. Pandya, Ashish A., Dynamic random access memory (DRAM) that comprises a programmable intelligent search memory (PRISM) and a cryptography processing engine.
  87. Stewart, Brett B., Dynamically modifying the display of a computing device to provide advertisements.
  88. Samuels, Allen; Sutter, Paul, Early generation of acknowledgements for flow control.
  89. Banister,Scott; Clegg,Paul; Schlampp,Peter; Peterson,Patrick R., Electronic message delivery using an alternate source approach.
  90. Rothwell, Anton C.; Dennis, William R.; Jagger, Luke D., Embedded anti-virus scanner for a network adapter.
  91. Rothwell, Anton C.; Dennis, William R.; Jagger, Luke D., Embedded anti-virus scanner for a network adapter.
  92. Rothwell, Anton C.; Dennis, William R.; Jagger, Luke D., Embedded anti-virus scanner for a network adapter.
  93. Panasyuk, Anatoliy; Pedersen, Bradley J.; Stone, David; Treder, Terry, Encapsulating protocol for session persistence and reliability.
  94. Bansal, Ravi Prakash; Hamilton, II, Rick Allen; O'Connell, Brian; Walker, Keith Raymond, Enhanced personal firewall for dynamic computing environments.
  95. Bansal, Ravi Prakash; Hamilton, II, Rick Allen; O'Connell, Brian; Walker, Keith Raymond, Enhanced personal firewall for dynamic computing environments.
  96. Chang, William Ho; Liu, Christina Ying, Essential components for enabling a pervasive wireless digital ecosystem and wireless devices that support the wireless digital ecosystem.
  97. Abzarian, David; Tamasi, David C.; Horton, Noah, Exceptions grouping.
  98. Elliott,Brig Barnum, Excising compromised routers from an ad-hoc network.
  99. McDysan, Dave; Thomas, Howard Lee; Yao, Lei, External processor for a distributed network access system.
  100. McDysan, Dave; Thomas, Howard Lee; Yao, Lei, External processor for a distributed network access system.
  101. McDysan, Dave; Thomas, Howard Lee; Yao, Lei, External processor for a distributed network access system.
  102. Mihelich, Joseph R.; Srivastav, Amit, Facilitating enforcement of security policies by and on behalf of a perimeter network security device by providing enhanced visibility into interior traffic flows.
  103. Lee,Michael C. G., Firewall for real-time internet applications.
  104. Dowd Patrick William ; Mchenry John Thomas, Firewall security apparatus for high-speed circuit switched networks.
  105. Prigent, Nicolas; Heen, Olivier; Bidan, Christophe; Courtay, Olivier; Andreaux, Jean-Pierre, Firewall system protecting a community of appliances, appliance participating in the system and method of updating the firewall rules within the system.
  106. Abzarian, David; Diaz Cuellar, Gerardo; Dabbiru, Satheesh S., Firewall with policy hints.
  107. Kaler, Christopher J.; Shewchuk, John P.; Della Libera, Giovanni M., Flexible electronic message security mechanism.
  108. Bonn, David Wayne; Marvais, Nick Takaski, Generalized network security policy templates for implementing similar network security policies across multiple networks.
  109. Dominic, Pushparani M., Generic security infrastructure for COM based systems.
  110. Khosravi, Hormuzd; Durham, David; Grewal, Karanvir, Hierarchical trust based posture reporting and policy enforcement.
  111. Khosravi, Hormuzd; Durham, David; Grewal, Karanvir, Hierarchical trust based posture reporting and policy enforcement.
  112. Pandya,Ashish A., High performance IP processor.
  113. Pandya, Ashish A., High performance IP processor using RDMA.
  114. Pandya, Ashish A., High performance IP processor using RDMA.
  115. Schnackenberg, Daniel D.; Schnackenberg, legal representative, Janell; Bunn, Kelly S., High-assurance web-based configuration of secure network server.
  116. Martin,Robert P.; Walker,Philip M.; Allen,Gregory R.; Laser,Mary; Marks,John; Hochmuth,Roland M., Highly secure computer system architecture for a heterogeneous client environment.
  117. Pandya, Ashish A, IP storage processor and engine therefor using RDMA.
  118. Pandya, Ashish A., IP storage processor and engine therefor using RDMA.
  119. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Identity blocking service from a wireless service provider.
  120. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Robert T., Identity blocking service from a wireless service provider.
  121. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Robert T., Identity blocking service from a wireless service provider.
  122. Vanyukhin, Nikolay; Shevnin, Oleg; Korotich, Alexey, Identity migration apparatus and method.
  123. Green, Stuart D.; Brown, Scott G.; Crain, Jonathan M.; Myers, Jeffrey Van; Perry, Carl A.; Yax, Marcus L., Improving security of data communications networks.
  124. Freimuth, Douglas M.; Mehra, Ashish; Tewari, Renu; Voigt, Thiemo, In-kernal content-aware service differentiation.
  125. Freimuth,Douglas Morgan; Mehra,Ashish; Tewari,Renu; Voigt,Thiemo, In-kernel content-aware service differentiation.
  126. Yariv, Eran; Diaz Cuellar, Gerardo; Abzarian, David, Incorporating network connection security levels into firewall rules.
  127. Yariv, Eran; Diaz-Cuellar, Gerardo; Abzarian, David, Incorporating network connection security levels into firewall rules.
  128. Felsher, David Paul, Information record infrastructure, system and method.
  129. Srivastava,Alok Kumar; Saggi,Dipak; Hamadani,Babak; Mishra,Sambit, Infrastructure for verifying configuration and health of a multi-node computer system.
  130. Yadav, Satyendra, Integrated network intrusion detection.
  131. Ross, Alan D., Integration of policy compliance enforcement and device authentication.
  132. Horton, Noah; Singhal, Sandeep K., Integration of social network information and network firewalls.
  133. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne M.; Shah, Lacky, Intelligent network streaming and execution system for conventionally coded applications.
  134. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne M.; Shah, Lacky, Intelligent network streaming and execution system for conventionally coded applications.
  135. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne Marie; Shah, Lacky Vasant, Intelligent network streaming and execution system for conventionally coded applications.
  136. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne Marie; Shah, Lacky Vasant, Intelligent network streaming and execution system for conventionally coded applications.
  137. Chang, William Ho; Liu, Christina Ying, Internet based digital content services that provide content upload, content storage, content sharing, content playlist selection, content editing, or content download; and smart phones, information pads, smart televisions and printers with access to the internet based digital content services.
  138. Chang, William Ho; Liu, Christina Ying, Internet-pad specification, the internet-pad specification may include a touch sensitive screen, a digital camera, a document application, an e-mail application, icons over the touch sensitive screen for user selection, a wireless communication unit for wireless connectivity, a digital content application for playing digital content, and an operating system supporting application programming interface (API).
  139. Chang, William Ho; Liu, Christina Ying, Internet-pads that include a digital camera, a touch sensitive screen interface, and support for voice activated commands.
  140. Chang, William Ho; Liu, Christina Ying, Internet-phone or smart phone with applications for managing and playing digital content, and a mobile device operating system supporting application programming interface.
  141. Day,Christopher W., Intrusion detection system.
  142. Day,Christopher W., Intrusion detection system using self-organizing clusters.
  143. Rygaard, Christopher A., Jumping application security system.
  144. Johnson, William J., Location based exchange operating system.
  145. Johnson, William J., Location based exchange permissions.
  146. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Location blocking service for wireless networks.
  147. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Location blocking service from a web advertiser.
  148. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Location blocking service from a web advertiser.
  149. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Location blocking service from a web advertiser.
  150. Zellner, Samuel N.; Enzmann, Mark J.; Morton, Jr., Robert T., Location blocking service from a wireless service provider.
  151. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Location blocking service from a wireless service provider.
  152. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Robert T., Location blocking service from a wireless service provider.
  153. Zellner, Samuel, Location-based security rules.
  154. Zellner,Samuel, Location-based security rules.
  155. Clegg, Paul J.; Huss, Eric C.; Sprosts, Craig; Chen, Shun; Brahms, Robert; Quinlan, Daniel, Managing connections and messages at a server by associating different actions for both different senders and different recipients.
  156. Clegg, Paul J.; Huss, Eric C.; Sprosts, Craig; Srinivasan, Krishna; Schlampp, Peter; Chen, Shun; Brahms, Robert; Quinlan, Daniel, Managing connections, messages, and directory harvest attacks at a server.
  157. Rothermel, Peter M.; Bonn, David Wayne; Marvais, Nick T., Managing multiple network security devices from a manager device.
  158. Roth, Gregory Branchek; O'Neill, Kevin Ross; Pratt, Brian Irl, Managing multiple security policy representations in a distributed environment.
  159. Zavalkovsky,Arthur; Parnafes,Itzhak; Mohaban,Shai, Marking network data packets with differentiated services codepoints based on network load.
  160. Davis, Mark Bradley; Chandra, Prashant R., Memcached server functionality in a cluster of data processing nodes.
  161. Davis, Mark Bradley; Chandra, Prashant R., Memcached server functionality in a cluster of data processing nodes.
  162. Pandya, Ashish A., Memory system for a high performance IP processor.
  163. McDysan, Dave; Thomas, Howard Lee; Yao, Lei, Message, control and reporting interface for a distributed network access system.
  164. Black, Robert Barth, Method and aparatus for presence based resource management.
  165. Zavalkovsky, Arthur; Zlotkin, Gilad, Method and apparatus for adapting enforcement of network quality of service policies based on feedback about network conditions.
  166. Mayer,Alain; Wool,Avishai; Ziskind,Elisha, Method and apparatus for analyzing one or more firewalls.
  167. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and apparatus for assigning access control levels in providing access to networked content files.
  168. Simmons, Timothy, Method and apparatus for associating tickets in a ticket hierarchy.
  169. Simmons, Timothy Ernest, Method and apparatus for associating tickets in a ticket hierarchy.
  170. Clymer,Andrew M.; Narayan,Kaushik, Method and apparatus for authorizing network device operations that are requested by applications.
  171. Cohen,Ron; Snir,Yoram; Schnizlein,John, Method and apparatus for automatically establishing bi-directional differentiated services treatment of flows in a network.
  172. Yanovsky, Boris; Yanovsky, Roman, Method and apparatus for centralized policy programming and distributive policy enforcement.
  173. Yanovsky, Boris; Yanovsky, Roman, Method and apparatus for centralized policy programming and distributive policy enforcement.
  174. Parnafes, Itzhak; Mohaban, Shai; McCloghrie, Keith, Method and apparatus for communicating COPS protocol policies to non-COPS-enabled network devices.
  175. Parnafes, Itzhak; Mohaban, Shai; McCloghrie, Keith, Method and apparatus for communicating cops protocol policies to non-cops-enabled network devices.
  176. Zavalkovsky,Arthur; Elfassy,Nitsan, Method and apparatus for communicating network quality of service policy information to a plurality of policy enforcement points.
  177. Chin, Hon Wah, Method and apparatus for configuration by a first network element based on operating parameters of a second network element.
  178. Arrow Leslie J. ; Bots Henk J. ; Hoke Mark R. ; Hunt William E. ; Jones Russell C. ; Liu Quentin C., Method and apparatus for configuring a virtual private network.
  179. Mor,Yishay; Koren,Dror, Method and apparatus for configuring network elements to support real time applications.
  180. Mor,Yishay; Koren,Dror, Method and apparatus for configuring network elements to support real time applications based on meta-templates.
  181. Mohaban,Shai; Woo,Steven M., Method and apparatus for creating policies for policy-based management of quality of service treatments of network data traffic flows.
  182. Bansal, Kaushal; Masurekar, Uday; Srinivasan, Aravind; Shah, Shadab; Maskalik, Serge, Method and apparatus for distributing firewall rules.
  183. Mann, Eric K.; Vasudevan, Anil, Method and apparatus for dynamic network configuration of an alert-based client.
  184. Kay, James, Method and apparatus for electronic mail filtering.
  185. Kay, James, Method and apparatus for electronic mail filtering.
  186. Kay, James, Method and apparatus for electronic mail filtering.
  187. Stewart, Brett B., Method and apparatus for geographic-based communications service.
  188. Stewart, Brett B., Method and apparatus for geographic-based communications service.
  189. Stewart, Brett B., Method and apparatus for geographic-based communications service.
  190. Stewart, Brett B., Method and apparatus for geographic-based communications service.
  191. Stewart, Brett B., Method and apparatus for geographic-based communications service.
  192. Stewart, Brett B., Method and apparatus for geographic-based communications service.
  193. Mao, Yu Ming; Lian, Roger Jia-Jyi; Huang, Guangsong; Cheung, Lee Chik, Method and apparatus for implementing a layer 3/layer 7 firewall in an L2 device.
  194. Mao,Yu Ming; Lian,Roger Jia Jyi; Huang,Guangsong; Cheung,Lee Chik, Method and apparatus for implementing a layer 3/layer 7 firewall in an L2 device.
  195. Bartal,Yair; Mayer,Alain Jules; Wool,Avishai, Method and apparatus for managing a firewall.
  196. Olivier, Michael; Sprosts, Craig; Kennedy, Scot; Quinlan, Daniel; Rosenstein, Larry; Taylor, Craig, Method and apparatus for managing computer virus outbreaks.
  197. Fazal, Lookman Y.; Kappes, Martin; Krishnakumar, Anjur S.; Krishnan, Parameshwaran, Method and apparatus for network security based on device security status.
  198. Stachura,Thomas L.; Cline,Michael K.; Vasudevan,Anil, Method and apparatus for performing network-based control functions on an alert-enabled managed client.
  199. Cuomo, Gennaro A.; Jamison, Wilfred C.; Nagaratnam, Nataraj, Method and apparatus for processing requests in a network data processing system based on a trust association between servers.
  200. Tindal,Glen D.; Schenk,Jeffery A., Method and apparatus for protecting a network from attack.
  201. Braddy, Ricky Gene; Simmons, Timothy Ernest; Stone, David Sean, Method and apparatus for providing authorized remote access to application sessions.
  202. Braddy, Ricky Gene; Simmons, Timothy Ernest; Stone, David Sean, Method and apparatus for providing authorized remote access to application sessions.
  203. Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olsen, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  204. Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olsen, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  205. Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olson, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  206. Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olson, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  207. Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olson, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  208. Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olson, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  209. Hanson, Aaron D.; Sturniolo, Emil; Menn, Anatoly; Olson, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  210. Hanson,Aaron D.; Sturniolo,Emil A.; Menn,Anatoly; Olson,Erik D.; Savarese,Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  211. Hanson,Aaron D.; Sturniolo,Emil A.; Menn,Anatoly; Olson,Erik D.; Savarese,Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  212. Sturniolo, Emil A.; Savarese, Joseph T.; Olson, Erik; Thompson, Dave; Jackson, Michael; Renouard, Julia, Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  213. Braddy, Ricky Gene; Simmons, Timothy Ernest; Calvin, Phillip N., Method and apparatus for providing policy-based document control.
  214. Sturniolo, Emil; Stavens, Aaron; Savarese, Joseph, Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments.
  215. Harrison, Robert Brian; Jasinskyj, Lonhyn; Clegg, Paul J.; Cottrell, Ben, Method and apparatus for providing temporary access to a network device.
  216. Cooper, Geoffrey; Sherlock, Kieran G.; Hoy, Mark, Method and apparatus for rate limiting.
  217. Hunter,Robert R., Method and apparatus for reading and controlling electric power consumption.
  218. Hunter,Robert R., Method and apparatus for reading and controlling utility consumption.
  219. Braddy, Ricky Gene; Simmons, Timothy Ernest, Method and apparatus for reducing disclosure of proprietary data in a networked environment.
  220. Dutta,Rabindranath; French,Steven Michael; Janakiraman,Janani, Method and apparatus for restricting a fan-out search in a peer-to-peer network based on accessibility of nodes.
  221. Dutta,Rabindranath; French,Steven Michael; Janakiraman,Janani, Method and apparatus for restricting a fan-out search in a peer-to-peer network based on accessibility of nodes.
  222. Frenkel,Ilan; Geller,Roman; Ramberg,Yoram; Snir,Yoram, Method and apparatus for retrieving network quality of service policy information from a directory in a quality of service policy management system.
  223. Blewett,Charles Douglas; Denker,John Stewart; Hall,Robert J., Method and apparatus for securely connecting a plurality of trust-group networks, a protected resource network and an untrusted network.
  224. Chang,Ching Jye; Ullmann,Lorin Evan, Method and apparatus in an application framework system for providing a port and network hardware resource firewall for distributed applications.
  225. Jeffrey Vinson ; Steig Westerberg ; Jeffrey DeVries, Method and apparatus to allow remotely located computer programs and/or data to be accessed on a local computer in a secure, time-limited manner, with persistent caching.
  226. Tatu Ylonen FI; Tero Kivinen FI, Method and arrangement for secure tunneling of data between virtual routers.
  227. Piepiorra,Frank; Maechtel,Michael; Jaenicke,Lutz, Method and computer system for securing communication in networks.
  228. Swander, Brian D.; Dixon, William H., Method and framework for integrating a plurality of network policies.
  229. Swander,Brian D.; Dixon,William H., Method and framework for integrating a plurality of network policies.
  230. Miller, Clint; Renteria, Ramon; Castoe, Mark; Rodney, Daniel; Dalton, Craig; Reynolds, Shad; Ellerbee, Jeff, Method and system for a generic data model.
  231. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  232. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  233. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  234. Maginniss, Eric, Method and system for calculating cost of an asset using a data model.
  235. Lowery, Keith A.; Chin, Bryan S.; Consolver, David A.; DeMasters, Gregg A., Method and system for community data caching.
  236. Lowery, Keith A.; Chin, Bryan S.; Consolver, David A.; DeMasters, Gregg A., Method and system for community data caching.
  237. Lowery, Keith A.; Chin, Bryan S.; Consolver, David A.; DeMasters, Gregg A., Method and system for community data caching.
  238. Lowery, Keith A.; Chin, Bryan S.; Consolver, David A.; DeMasters, Gregg A., Method and system for community data caching.
  239. Grimes, Mikal; Williams, David K.; Balling, Jr., James, Method and system for determination of data completeness for analytic data calculations.
  240. Grabelsky,David; Borella,Michael S.; Sidhu,Ikhlaq; Nessett,Danny M., Method and system for distributed network address translation with network security features.
  241. Koti, Shirish; Nagampalli, Narasimha Rao S. S.; Ivanov, Maxim Alexandrovich; Sheth, Sachin C.; Paleologu, Emanuel; Lin, Yun; Youngblut, Eric Erwin, Method and system for distributing security policies.
  242. Koti,Shirish; Nagampalli,Narasimha Rao S. S.; Ivanov,Maxim Alexandrovich; Sheth,Sachin C.; Paleologu,Emanuel; Lin,Yun; Youngblut,Eric Erwin, Method and system for distributing security policies.
  243. Lowery, Keith A.; Chin, Bryan S.; Consolver, David A.; DeMasters, Gregg A., Method and system for dynamic distributed data caching.
  244. Lowery, Keith A.; Chin, Bryan S.; Consolver, David A.; DeMasters, Gregg A., Method and system for dynamic distributed data caching.
  245. Lowery, Keith A.; Chin, Bryan S.; Consolver, David A.; DeMasters, Gregg A., Method and system for dynamic distributed data caching.
  246. Lowery, Keith A.; Chin, Bryan S.; Consolver, David A.; DeMasters, Gregg A., Method and system for dynamic distributed data caching.
  247. Lowery, Keith A.; Chin, Bryan S.; Consolver, David A.; DeMasters, Gregg A., Method and system for dynamic distributed data caching.
  248. Lowery, Keith A.; Chin, Bryan S.; Consolver, David A.; DeMasters, Gregg A., Method and system for dynamic distributed data caching.
  249. Lowery, Keith A.; Chin, Bryan S.; Consolver, David A.; DeMasters, Gregg A., Method and system for dynamic distributed data caching.
  250. Lowery, Keith A.; Chin, Bryan S.; Consolver, David A.; DeMasters, Gregg A., Method and system for dynamic distributed data caching.
  251. Lowery, Keith A.; Chin, Bryan S.; Consolver, David A.; DeMasters, Gregg A., Method and system for dynamic distributed data caching.
  252. Lowery, Keith A; Chin, Bryan S; Consolver, David A; DeMasters, Gregg A, Method and system for dynamic distributed data caching.
  253. Lowery,Keith A.; Chin,Bryan S.; Consolver,David A.; DeMasters,Gregg A., Method and system for dynamic distributed data caching.
  254. Lowery, Keith A.; Chin, Bryan S.; Consolver, David A.; DeMasters, Gregg A., Method and system for dynamic distributed data caching when a source of data is not available.
  255. Rivera, Juan, Method and system for dynamically associating access rights with a resource.
  256. Rivera, Juan, Method and system for dynamically associating access rights with a resource.
  257. Patton, Charles; Roschelle, Jeremy; Pea, Roy D.; Vahey, Phil, Method and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment.
  258. Malan, Gerald R.; Jahanian, Farnam, Method and system for profiling network flows at a measurement point within a computer network.
  259. Campbell, R. David L.; Onnen, Paul E.; Sarausad, Edward M.; Plate, Steven W., Method and system for providing remote access to the facilities of a server computer.
  260. Bodman, Mark David; Brown, Gary I.; Grimes, Mikal; Renteria, Ramon; Van Riper, James Edward, Method and system for tailoring software functionality.
  261. Rao, Goutham; McCarthy, Lewis; Simmons, Timothy Ernest, Method and system for verification of an endpoint security scan.
  262. Rao, Goutham; McCarthy, Lewis; Simmons, Timothy Ernest, Method and system for verification of an endpoint security scan.
  263. DeLange, Mark, Method and system to facilitate management of a distributed network.
  264. Cox, Dennis; McClanahan, Kip, Method for blocking denial of service and address spoofing attacks on a private network.
  265. Cox, Dennis; McClanahan, Kip, Method for blocking denial of service and address spoofing attacks on a private network.
  266. Green,Stuart D.; Brown,Scott G.; Crain,Jonathan M.; Van Myers,Jeffrey; Perry,Carl A.; Yax,Marcus L., Method for communication security and apparatus therefor.
  267. Green, Stuart D.; Brown, Scott G.; Crain, Jonathan M.; Van Myers, Jeffrey; Perry, Carl A.; Yax, Marcus L., Method for communication security and apparatus therefore.
  268. Nuttall, François Xavier, Method for computer network operation providing basis for usage fees.
  269. De Jaegher, Jeanne Emmanuelle Rita; Manisor, Razvan; Six, Erwin Alfons Constant, Method for control of communications from edge device of access network, and edge device and network management module for performing method.
  270. Ben Itzhak, Yuval, Method for the automatic setting and updating of a security policy.
  271. Oshima,Satoshi; Sato,Masahide, Method for updating security information, client, server and management computer therefor.
  272. Brawn,John Melvin; Jemes,Brian; Froelich,Stephen F., Method of creating an address and a discontiguous mask for a network security policy area.
  273. Wildish,Michael Andrew; Ansell,Stephen M.; Crerar,Michael C., Method of establishing secure communications in a digital network using pseudonymic digital identifiers.
  274. Ho,Yong Boon; Natarajan,Srikanth; Gupta,Dipankar, Method of storing data concerning a computer network.
  275. Bansal, Ravi Prakash; Hamilton, II, Rick Allen; O'Connell, Brian Marshall; Walker, Keith Raymond, Method to apply network encryption to firewall decisions.
  276. Colby,Logan M.; Frey,Jeffrey A.; High,Robert H.; Vignola,Christopher P., Method, system, and storage medium for providing context-based dynamic policy assignment in a distributed processing environment.
  277. Colby,Logan M.; Frey,Jeffrey A.; High,Robert H.; Vignola,Christopher P., Method, system, and storage medium for providing context-based dynamic policy assignment in a distributed processing environment.
  278. Kahn,Clifford E., Methods and apparatus for controlling access to a resource.
  279. Balabine, Igor, Methods and apparatus for securing access to a computer.
  280. Li, Hong C.; Sahita, Ravi; Yadav, Satyendra, Methods and systems for managing security policies.
  281. Brunette, Glenn M.; Walker, David, Methods and systems for securing a system in an adaptive computer environment.
  282. Burris, Brandon C., Methods and systems of advertising based on aggregated information of social networks within geographical locations via a network.
  283. Burris, Brandon C.; Harvell, Sean, Methods and systems of aggregating information of geographic context regions of social networks based on geographical locations via a network.
  284. Burris, Brandon C., Methods and systems of aggregating information of social networks based on geographical locations via a network.
  285. Krumel,Andrew K., Methods for packet filtering including packet invalidation if packet validity determination not timely made.
  286. Krumel, Andrew K., Methods for updating the configuration of a programmable packet filtering device including a determination as to whether a packet is to be junked.
  287. Rygaard,Christopher A., Mobile application access control list security system.
  288. Rygaard, Christopher A., Mobile application morphing system and method.
  289. Rygaard,Christopher A., Mobile application peer-to-peer security system and method.
  290. Rygaard, Christopher A., Mobile application security system and method.
  291. Rygaard,Chris; Bisted, Jr.,Morris J., Mobile application security system and method.
  292. Chang, William Ho; Liu, Christina Ying, Mobile device methods for enabling pervasive wireless digital media.
  293. Chang, William Ho; Liu, Christina Ying, Mobile devices supporting wireless synchronization over a wireless Network compatible, at least partly, with IEEE 802.11 standard(s).
  294. Chang, William Ho; Liu, Christina Ying, Mobile information apparatus for wireless search and data transfer.
  295. Chang, William Ho; Liu, Christina Ying, Mobile information apparatus that are configurable to include applications for playing audio digital content received over the internet from subscribed audio digital content service(s).
  296. Chang, William Ho; Liu, Christina Ying, Mobile information apparatus that include support for receiving video digital content over the internet from a service, and for wireless displaying or playing over air at least part of the received video digital content from the mobile information apparatus to televisions, television controllers, display devices, or projection devices.
  297. Chang, William Ho; Liu, Christina Ying, Mobile information apparatus that includes intelligent wireless display, wireless direct display, or transfer of digital content for playing over air the digital content at smart televisions, television controllers, or audio output devices.
  298. Chang, William Ho; Liu, Christina Ying, Mobile information apparatus that includes voice commands for playing digital content that is received from a digital content service provided over the internet.
  299. Sturniolo, Emil A.; Savarese, Joseph T.; Olson, Erik; Patashnik, Eli, Mobile networking system and method using IPv4 and IPv6.
  300. Slater, Charles S.; Clegg, Paul J.; Evans, Brennan H.; Schlampp, Peter, Monitoring the flow of messages received at a server.
  301. Robert R. Hunter ; David A. Vogt ; Leslie Cheong, Multi-capability facilities monitoring and control intranet for facilities management system.
  302. Swander,Brian D.; Mayfield,Paul G., Multi-layered firewall architecture.
  303. Flyntz, Terence T., Multi-level secure computer with token-based access control.
  304. Docter Eric E. ; Hofmann William D. ; Hurley Paul E., Multi-stage data filtering system employing multiple filtering criteria.
  305. Sato, Takayuki, Multi-unit building with secure entry system.
  306. Ross, Alan D., Multifactor device authentication.
  307. Terzis, Andreas; Murgia, Marco A.; Baskaran, Ashwin, Multilayer access control security system.
  308. Erik E. Hagersten ; Christopher J. Jackson ; Aleksandr Guzovskiy ; William A. Nesheim, Multiprocessing computer system employing a cluster protection mechanism.
  309. Taylor, Kevin R.; Murugesan, Ganesh; Tajalli, Homayoon, Network access control system and method using adaptive proxies.
  310. Taylor,Kevin R.; Murugesan,Ganesh; Tajalli,Homayoon, Network access control system and method using adaptive proxies.
  311. McDysan, Dave; Thomas, Howard Lee; Yao, Lei, Network access system including a programmable access device having distributed service control.
  312. McDysan,Dave; Thomas,Howard Lee; Yao,Lei, Network access system including a programmable access device having distributed service control.
  313. McDysan,Dave; Thomas,Howard Lee; Yao,Lei, Network access system including a programmable access device having distributed service control.
  314. Jagger, Luke D.; Rothwell, Anton C.; Dennis, William R., Network adapter firewall system and method.
  315. Jagger, Luke D.; Rothwell, Anton C.; Dennis, William R., Network adapter firewall system and method.
  316. Kenworthy, Stacy, Network attached device with dedicated firewall security.
  317. Kenworthy, Stacy, Network attached device with dedicated firewall security.
  318. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Payne, John; Nakawatase, Ryan Tadashi; Walpole, Thomas Paul; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste, Network audit and policy assurance system.
  319. Wolf,Jonathan S.; Mellor,Arthur B.; Tackabury,Wayne F.; Anderson,Christopher B.; Whitworth,Robin M.; Haag,Michael D.; Del Vecchio,Brian A., Network configuration manager.
  320. Kayashima,Makoto; Fujiyama,Tatsuya; Terada,Masato; Watanabe,Yoshinori; Ogino,Takaaki, Network management system for generating setup information for a plurality of devices based on common meta-level information.
  321. Ezaki,Toshihiro; Ito,Asanobu; Nishioka,Minoru, Network management system having access manager for managing access to recording medium apparatus.
  322. Davis, Mark B; Borland, David James; Volpe, Thomas A; Goss, Kenneth S., Network proxy for high-performance, low-power data center interconnect fabric.
  323. Davis, Mark B; Borland, David James; Volpe, Thomas A; Goss, Kenneth S., Network proxy for high-performance, low-power data center interconnect fabric.
  324. Parker,Benjamin J.; Werner,Shane W.; Diaz,Charles; Frederick,Terry M., Network security services architecture.
  325. Bearden, Mark J.; Denby, Lorraine; Karacali, Bengi; Meloche, Jean; Stott, David Thomas, Network topology discovery systems and methods.
  326. Borland, David; Schnell, Arnold Thomas; Davis, Mark, Node card management in a modular and large scalable server system.
  327. Borland, David; Schnell, Arnold Thomas; Davis, Mark, Node card management in a modular and large scalable server system.
  328. Borland, David; Schnell, Arnold Thomas; Davis, Mark, Node card utilizing a same connector to communicate pluralities of signals.
  329. DeVries, Jeffrey; Hitomi, Arthur, Opportunistic block transmission with time constraints.
  330. DeVries, Jeffrey; Hitomi, Arthur S., Opportunistic block transmission with time constraints.
  331. DeVries, Jeffrey; Hitomi, Arthur S., Opportunistic block transmission with time constraints.
  332. de Vries, Jeffrey; Hitomi, Arthur Shingen, Opportunistic block transmission with time constraints.
  333. de Vries, Jeffrey; Hitomi, Arthur Shingen, Opportunistic block transmission with time constraints.
  334. de Vries, Jeffrey; Hitomi, Arthur Shingen, Opportunistic block transmission with time constraints.
  335. Holler, Anne Marie; Shah, Lacky Vasant; Panwar, Sameer; Patel, Amit, Optimized server for streamed applications.
  336. Carley, Jeffrey A., Out-of-band remote management station.
  337. Carley,Jeffrey Alan, Out-of-band remote management station.
  338. Chang, William Ho; Liu, Christina Ying, Output device and method for output without an output driver.
  339. Chang, William Ho; Liu, Christine Ying, Output device and method for output without an output driver.
  340. Chang, William Ho; Liu, Christina Ying, Output service over a network.
  341. Chang, William Ho; Liu, Christina Ying, Output systems, information apparatus, or internet appliances supporting voice commands for receiving and for playing selected digital content from a service over a network.
  342. Krumel,Andrew K., PLD-based packet filtering methods with PLD configuration data update of filtering rules.
  343. Shanklin, Steven D.; Lathem, Gerald S., Parallel intrusion detection sensors with load balancing for high speed networks.
  344. Shanklin, Steven D.; Lathem, Gerald S., Parallel intrusion detection sensors with load balancing for high speed networks.
  345. Davis, Mark; Borland, David, Performance and power optimized computer system architectures and methods leveraging power optimized tree fabric interconnect.
  346. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Persistent and reliable session securely traversing network components using an encapsulating protocol.
  347. Sarangam,Parthasarathy; Vasudevan,Anil, Platform independent alert detection and management.
  348. Hollingshead, Daniel; Vasant, Sachin; Dotan, Yedidya; Miglani, Umesh Kumar; Knjazihhin, Denis, Policy block creation with context-sensitive policy line classification.
  349. Burk, Gregory T.; Coote, Lachlan T., Policy composition language.
  350. Bellinger,Douglas; Burke,Richard; Phillips,Thomas; Argentina,Antonino Scaffidi; Baptiste,Andrea; Delahousse,Gaetan; Stewart,Geoff; Raoux,Wendy; Richard,Luc; Bazin,Stephanie; Brookes,Scott; Rhude,Patrick, Policy distribution point for setting up network-based services.
  351. Walter, Martin; Fitz-Gerald, Jeffrey, Policy enforcement based on dynamically attribute-based matched network objects.
  352. Wang, Song; Walter, Martin; Jin, Zhipu; Xu, Wilson, Policy enforcement in a virtualized environment.
  353. Wang, Song; Walter, Martin; Jin, Zhipu; Xu, Wilson, Policy enforcement in virtualized environment.
  354. Armitano, Robert M.; Mihajlovic, Dejan L.; Muhlestein, Mark; Thompson, Timothy J.; Uren, James T.; Yoder, Alan G., Policy engine to control the servicing of requests received by a storage server.
  355. Burk, Gregory T.; Coote, Lachlan T.; Yankov, Yanislav; Dumesny, Alain, Policy framework user interface.
  356. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Policy inheritance through nested groups.
  357. Burk, Gregory T.; Coote, Lachlan T., Policy store.
  358. Burk, Gregory T.; Coote, Lachlan T., Policy validation.
  359. Chang, William Ho; Liu, Christina Ying, Portable electronic device configured to receive voice activated commands and to wirelessly manage or drive an output device.
  360. Chang, William Ho; Liu, Christine Ying, Portable information apparatus that includes touch sensitive screen interface and wireless communication circuitry for selecting an output device on the touch sensitive screen and for wireless transmitting output stream to the selected output device.
  361. Chang, William Ho; Liu, Christina Ying, Printers, printer controllers, printer software, or printer firmware for supporting wireless printing or printing over air.
  362. McDysan, Dave; Thomas, Howard Lee; Yao, Lei, Programmable access device for a distributed network access system.
  363. Pandya, Ashish A., Programmable intelligent search memory (PRISM) and cryptography engine enabled secure DRAM.
  364. Pandya, Ashish A., Programmable intelligent search memory enabled secure flash memory.
  365. Freskos, Mark A.; Hawke, Michelle D.; Turnbull, Jonathan; Raju, Satyanarayana; Norris, Christopher; Jain, Kapil; Tanner, David A.; Singh, Dilbag, Protocol for efficient exchange of XML documents with a network device.
  366. Brown,Martin A.; Gullotto,Vincent P., Protocol layer-level system and method for detecting virus activity.
  367. Duggal, Sachin, Providing a local device with computing services from a remote host.
  368. Duggal, Sachin, Providing a user with virtual computing services.
  369. Duggal, Sachin, Providing a user with virtual computing services.
  370. Stewart, Brett B., Providing advertisements to a computing device based on a predetermined criterion of a wireless access point.
  371. Stewart, Brett B., Providing an advertisement based on a geographic location of a wireless access point.
  372. Stewart, Brett B., Providing information to a computing device based on known location and user information.
  373. Stewart, Brett R., Providing information to a computing device based on known location and user information.
  374. Stewart, Brett B., Providing promotion information to a device based on location.
  375. Barrett, Joseph G., Public network access server having a user-configurable firewall.
  376. Stewart, Brett B., Receiving location based advertisements on a wireless communication device.
  377. Tindal, Glen; Schenk, Jeffery A., Redirecting data generated by network devices.
  378. Earnest, Jerry Brett, Redundant email address detection and capture system.
  379. Floyd, III, Robert K.; Mandalia, Baiju D.; Monaco, Robert P.; Viswanathan, Mahesh, Regional firewall clustering in a networked computing environment.
  380. Floyd, III, Robert K.; Mandalia, Baiju D.; Monaco, Robert P.; Viswanathan, Mahesh, Regional firewall clustering in a networked computing environment.
  381. Floyd, III, Robert K.; Mandalia, Baiju D.; Monaco, Robert P.; Viswanathan, Mahesh, Regional firewall clustering in a networked computing environment.
  382. Floyd, III, Robert K.; Mandalia, Baiju D.; Monaco, Robert P.; Viswanathan, Mahesh, Regional firewall clustering in a networked computing environment.
  383. Krause,Michael R.; Worley,Fred B.; Iyer,Shankar G., Reliable datagram.
  384. Krause,Michael R.; Garcia,David J.; Culley,Paul R.; Recio,Renato J.; Benner,Alan F., Reliable datagram transport service.
  385. Krause,Michael R.; Worley,Fred B.; Scott,Kimberly K., Reliable multicast.
  386. Davis, Mark Bradley; Evans, Barry Ross; Borland, David James, Remote memory access functionality in a cluster of data processing nodes.
  387. Davis, Mark Bradley; Evans, Barry Ross; Borland, David James, Remote memory access functionality in a cluster of data processing nodes.
  388. Masurekar, Uday; Bansal, Kaushal, Replicating firewall policy across multiple data centers.
  389. Bearden, Mark J.; Denby, Lorraine; Karacali, Bengi; Meloche, Jean; Stott, David Thomas, Report generation and visualization systems and methods and their use in testing frameworks for determining suitability of a network for target applications.
  390. Strassner,John, Repository-independent system and method for asset management and reconciliation.
  391. Lucco, Steven E.; Christensen, Erik B.; Layman, Andrew J.; Levin, David E.; Lovering, Bradford H.; Nielsen, Henrik Frystyk; Shewchuk, John P., Resolving virtual network names.
  392. Nash, Alistair, Resource access filtering system and database structure for use therewith.
  393. Burk, Gregory T.; Coote, Lachlan T., Resource categorization for policy framework.
  394. Dutta, Rabindranath; French, Steven Michael; Janakiraman, Janani, Restricting a fan-out search in a peer-to-peer network based on accessibility of nodes.
  395. Ross, Alan D., Role-based network traffic-flow rate control.
  396. Mao, Yu Ming; Lian, Roger Jia-Jyi; Huang, Guangsong; Cheung, Lee Chik, Routing a packet by a device.
  397. Mao, Yu Ming; Lian, Roger Jia-Jyi; Huang, Guangsong; Cheung, Lee Chik, Routing a packet by a device.
  398. Mao, Yuming; Lian, Roger Jia-Jyi; Huang, Guangsong; Cheung, Lee Chik, Routing a packet by a device.
  399. Pandya, Ashish A., Runtime adaptable protocol processor.
  400. Pandya, Ashish A., Runtime adaptable search processor.
  401. Kaler, Christopher G.; Della-Libera, Giovanni M.; Waingold, Elliot, Scoped access control metadata element.
  402. Kaler, Christopher G.; Della-Libera, Giovanni; Waingold, Elliot, Scoped access control metadata element.
  403. Nielsen, Henrik F.; Kaler, Christopher G.; Lucco, Steven E.; Levin, David E.; Christensen, Erik B., Scoped referral statements.
  404. Boydstun,Kenneth C.; Marshall,Stephen L.; Chen,Jun, Screened subnet having a secured utility VLAN.
  405. Gaur, Santosh P.; Hall, William Eric, Secure data transfer over a network.
  406. Magdych, James S.; Rahmanovic, Tarik; McDonald, John R.; Tellier, Brock E.; Osborne, Anthony C.; Herath, Nishad P., Secure gateway with firewall and intrusion detection capabilities.
  407. Carley, Jeffrey Alan, Secure management access control for computers, embedded and card embodiment.
  408. Carley,Jeffrey Alan, Secure management access control for computers, embedded and card embodiment.
  409. Brawn,John Melvin; Klein,Christian, Secure network and method of establishing communication amongst network devices that have restricted network connectivity.
  410. Picher Dempsey,Heidi, Secure network architecture with quality of service.
  411. Carley, Jeffrey Alan, Secure remote management appliance.
  412. Carley,Jeffrey Alan, Secure remote management appliance.
  413. Whitaker, David James; Anspach, Jonathan Paul, Secure segregation of data of two or more domains or trust realms transmitted through a common data channel.
  414. Whitaker, David James; Anspach, Jonathan Paul, Secure segregation of data of two or more domains or trust realms transmitted through a common data channel.
  415. Whitaker,David J; Anspach,Jonathan Paul, Secure segregation of data of two or more domains or trust realms transmitted through a common data channel.
  416. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay, Secure traversal of network components.
  417. Desai, Sachin; Liu, Qingqing; Fischer, Ronald, Secured inter-application communication in mobile devices.
  418. Whitmer,Ray; Dhurvasula,Harish, Securing resources from untrusted scripts behind firewalls.
  419. Eric M. Olden, Security and access management system for web-enabled and non-web-enabled applications and content on a computer network.
  420. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Security control module.
  421. Kulack, Frederick Allyn; Moore, Scott Alan, Security enhancements for pervasive devices.
  422. Kulack,Frederick Allyn; Moore,Scott Alan, Security enhancements for pervasive devices.
  423. Kulack,Frederick Allyn; Moore,Scott Alan, Security enhancements for pervasive devices.
  424. Erfani, Shervin, Security management system and method.
  425. Wray, Michael, Security protocol.
  426. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Security provider development model.
  427. LeGrow,Matthew A., Security scanning system and method utilizing generic IP addresses.
  428. Teixeira, Steven L.; Carr, Christopher, Security system and methodology for providing indirect access control.
  429. Freund, Gregor P., Security system with methodology for interprocess communication control.
  430. Qiao,Chunming; Xu,Dahai; Xiong,Yizhi, Segment protection scheme for a network.
  431. Davis, Mark Bradley; Borland, David James; Schnell, Arnold Thomas, Server on a chip and node cards comprising one or more of same.
  432. Hou, Yiwei Thomas; Dong, Yingfei; Taniguchi, Tomohiko, Server-based network performance metrics generation system and method.
  433. Johnson, William J., Server-less synchronized processing across a plurality of interoperating data processing systems.
  434. Goldszmidt German Sergio ; Turek John J. E. ; Vetter Brian Jay, Service request routing using quality-of-service data and network resource information.
  435. Chen,Shigang; Zou,Bo, Simplifying the selection of network paths for implementing and managing security policies on a network.
  436. Ghostine, Peter E.; McDonald, Michael, Single sign-on system for shared resource environments.
  437. Chang, William Ho; Liu, Christina Ying, Smart phone that includes a wireless communication unit compatible with at least one protocol within bluetooth and/or IEEE802.11 standards for wireless transmission of audio digital content from the smart phone to a wireless audio output device for voice output or music playing.
  438. Chang, William Ho; Liu, Christina Ying, Smart phones that include a digital camera, a touch sensitive screen, support for voice activated commands, and support to at least part of a protocol within IEEE 802.11 standards.
  439. Chang, William Ho; Liu, Christina Ying, Smart phones that include touch sensitive screen and supporting voice activated commands for managing or replying to E-mails.
  440. Chang, William Ho; Liu, Christina Ying, Smart phones that support wireless printing of emails over air to a wireless printer in a wireless local area network.
  441. Vinson, Jeffrey; Westerberg, Steig G.; Vries, Jeffrey De, Software streaming system and method.
  442. Vinson, Jeffrey; Westerberg, Steig; DeVries, Jeffrey, Software streaming system and method.
  443. Vinson, Jeffrey; Westerberg, Steig; DeVries, Jeffrey, Software streaming system and method.
  444. Chang, William Ho; Liu, Christina Ying, Sound output system or internet appliance that supports voice activated commands, and that plays audio data received from a service over a network.
  445. Chang, William Ho; Liu, Christina Ying, Specification of smart wireless television for rendering digital content.
  446. Nahum,Nelson, Storage area network (SAN) security.
  447. Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N., Surveying wireless device users by location.
  448. Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N., Surveying wireless device users by location.
  449. Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N., Surveying wireless device users by location.
  450. Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N., Surveying wireless device users by location.
  451. Syvanne,Tuomo; Jalava,Mika, Synchronization of security gateway state information.
  452. Beers, Ted W; Gorzynski, Mark E; Wickes, William C; Brewster, Jon A; Gargan, Garrett Daniel; Thielman, Jeffrey L; Grasley, Scott, Synthetic bridging for networks.
  453. Beers, Ted W; Gorzynski, Mark E; Wickes, William C; Brewster, Jon A; Gargan, Garrett Daniel; Thielman, Jeffrey L; Grasley, Scott, Synthetic bridging for networks.
  454. Gooderum Mark P. ; Vu Trinh Q. ; Andreas Glenn, System and method for achieving network separation.
  455. Moriconi,Mark S.; Godik,Simon; Xu,Mingde; Yagen,Ken, System and method for analyzing security policies in a distributed computer network.
  456. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J.; Mesdaq, Ali A., System and method for analyzing web content.
  457. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A., System and method for analyzing web content.
  458. Baddour, Victor L; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A, System and method for analyzing web content.
  459. Johnson, William J., System and method for application context location based configuration suggestions.
  460. Johnson, William J., System and method for application search results by locational conditions.
  461. Pagan, Florence C. I.; Short, Joel E., System and method for authorizing a portable communication device.
  462. Johnson, William J.; Johnson, Jason M., System and method for automated content distribution objects.
  463. Johnson, William J.; Johnson, Jason M., System and method for automated content presentation objects.
  464. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste; Payne, John, System and method for automated policy audit and remediation management.
  465. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste; Payne, John, System and method for automated policy audit and remediation management.
  466. Schwab, Stephen A., System and method for communicating coalesced rule parameters in a distributed computing environment.
  467. Tindal,Glen D.; Schenk,Jeffery A., System and method for configuration, management and monitoring of network resources.
  468. Tindal, Glen D., System and method for configuring a network device.
  469. Johnson, William J.; Johnson, Jason M., System and method for confirming data processing system target(s).
  470. Rider,Kenneth D.; Ferrin,Daniel; Post,Ted, System and method for controlling access rights to network resources.
  471. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  472. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  473. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  474. Reid Irving,CAX ; Minear Spencer, System and method for controlling interactions between networks.
  475. Davis, Mark; Borland, David; Hobbs, Jason; Marquette, Danny; Volpe, Thomas A.; Goss, Ken, System and method for data center security enhancements leveraging managed server SOCs.
  476. Davis, Mark; Borland, David; Hobbs, Jason; Marquette, Danny; Volpe, Thomas A.; Goss, Ken, System and method for data center security enhancements leveraging managed server SOCs.
  477. Davis, Mark; Borland, David; Hobbs, Jason; Marquette, Danny; Volpe, Tom; Goss, Ken, System and method for data center security enhancements leveraging managed server SOCs.
  478. Davis, Mark; Borland, David; Hobbs, Jason; Marquette, Danny; Volpe, Thomas A.; Goss, Ken, System and method for data center security enhancements leveraging server SOCs or server fabrics.
  479. Davis, Mark; Borland, David; Hobbs, Jason; Marquette, Danny; Volpe, Thomas A.; Goss, Ken, System and method for data center security enhancements leveraging server SOCs or server fabrics.
  480. Davis, Mark; Borland, David; Hobbs, Jason; Marquette, Danny; Volpe, Thomas; Goss, Ken, System and method for data center security enhancements leveraging server SOCs or server fabrics.
  481. Davis, Mark; Hobbs, Jason; Borland, David; Marquette, Danny; Volpe, Tom; Goss, Ken, System and method for data center security enhancements leveraging server SOCs or server fabrics.
  482. Tindal, Glen D., System and method for defining a policy enabled network.
  483. Whitmore, James J., System and method for designing secure business solutions using patterns.
  484. Johnson, William J., System and method for determining mobile users of interest.
  485. Sitaraman,Aravind; Cox,Dennis J.; Joyce,John A.; Zhang,Shujin, System and method for determining subscriber information.
  486. Hubbard, Daniel Lyle; Ruskin, Dan, System and method for dynamic and real-time categorization of webpages.
  487. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  488. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  489. Schnell, Arnold Thomas; Waldorf, Richard Owen; Borland, David, System and method for flexible storage and networking provisioning in large scalable processor installations.
  490. Schnell, Arnold Thomas; Waldorf, Richard Owen; Borland, David, System and method for flexible storage and networking provisioning in large scalable processor installations.
  491. Gorthy, Scott B.; Kelly, Brendan; Hearne, Derek S.; Heiser, David B.; Taylor, Bret C., System and method for generating a configuration schema.
  492. Courtney,Mike, System and method for generating a representation of a configuration schema.
  493. Cheriton,David, System and method for generating filters based on analyzed flow data.
  494. Davis, Mark Bradley; Borland, David James, System and method for high-performance, low-power data center interconnect fabric.
  495. Davis, Mark Bradley; Borland, David James, System and method for high-performance, low-power data center interconnect fabric.
  496. Davis, Mark Bradley; Borland, David James; Evans, Barry Ross, System and method for high-performance, low-power data center interconnect fabric.
  497. Davis, Mark; Borland, David James, System and method for high-performance, low-power data center interconnect fabric with addressing and unicast routing.
  498. Davis, Mark; Borland, David James, System and method for high-performance, low-power data center interconnect fabric with broadcast or multicast addressing.
  499. Sitaraman, Aravind; Abdul, Aziz; James, Bernard R.; Cox, Dennis J.; Joyce, John A.; Heitman, Peter S.; Zhang, Shujin; Tio, Rene T., System and method for identifying a subscriber for connection to a communication network.
  500. Sitaraman,Aravind; Abdul,Aziz; James,Bernard R.; Cox,Dennis J.; Joyce,John A.; Heitman,Peter S.; Zhang,Shujin; Tio,Rene T., System and method for identifying a subscriber for connection to a communication network.
  501. Jemes,Brian; Brawn,John Melvin; Garcia,Joseph; Milligan,Michael; Pape,John M.; Hansell,Jeff, System and method for implementing network security policies on a common network infrastructure.
  502. Moriconi,Mark S.; Godik,Simon; Xu,Mingde; Yagen,Ken, System and method for incrementally distributing a security policy in a computer network.
  503. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpoie, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  504. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpole, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  505. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpole, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  506. Johnson, William J., System and method for location based exchange vicinity interest specification.
  507. Johnson, William J., System and method for location based exchange vicinity interest specification.
  508. Johnson, William J., System and method for location based exchanges of data facilitating distributed location applications.
  509. Johnson, William J., System and method for location based exchanges of data facilitating distributed location applications.
  510. Johnson, William J., System and method for location based exchanges of data facilitating distributed locational applications.
  511. Johnson, William J., System and method for location based exchanges of data facilitating distributed locational applications.
  512. Johnson, William J., System and method for location based exchanges of data facilitating distributed locational applications.
  513. Johnson, William J., System and method for location based exchanges of data facilitating distributed locational applications.
  514. Johnson, William J., System and method for location based exchanges of data facilitating distributed locational applications.
  515. Johnson, William J., System and method for location based inventory management.
  516. Rensin, David K.; Hanay, John W.; Lavelle, Timothy C.; Montellato, David A.; Obot, James J.; Rubin, Jeff M.; Williams, Cuong G.; Yuryev, Yuri, System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall.
  517. Rensin, David K.; Hanay, John W.; Lavelle, Timothy C.; Montellato, David A.; Obot, James J.; Rubin, Jeff M.; Williams, Cuong G.; Yuryev, Yuri, System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall.
  518. Rensin, David K.; Hanay, John W.; Williams, Cuong G.; Yuryev, Yuri, System and method for lost data destruction of electronic data stored on portable electronic devices.
  519. Rensin, David K.; Hanay, John W.; Williams, Cuong G.; Yuryev, Yuri, System and method for lost data destruction of electronic data stored on portable electronic devices.
  520. Rensin, David K.; Hanay, John W.; Williams, Cuong G.; Yuryev, Yuri, System and method for lost data destruction of electronic data stored on portable electronic devices.
  521. Moriconi Mark ; Qian Shelly, System and method for maintaining security in a distributed computer network.
  522. Moriconi, Mark S., System and method for maintaining security in a distributed computer network.
  523. Moriconi, Mark; Qian, Shelly, System and method for maintaining security in a distributed computer network.
  524. Moriconi,Mark; Qian,Shelly, System and method for maintaining security in a distributed computer network.
  525. Moriconi,Mark; Qian,Shelly, System and method for maintaining security in a distributed computer network.
  526. Yang,Xuechen, System and method for managing dynamic network sessions.
  527. Strassner, John, System and method for mapping between and controlling different device abstractions.
  528. Johnson, William J., System and method for mobile device usability by locational conditions.
  529. Courtney,Mike, System and method for modeling a network device's configuration.
  530. Barrett,Michael R; Plummer,Michael, System and method for monitoring and ensuring data integrity in an enterprise security system.
  531. Taylor, Kevin R.; Murugesan, Ganesh; Tajalli, Homayoon, System and method for network access control using adaptive proxies.
  532. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  533. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  534. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  535. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  536. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  537. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  538. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  539. Gaur, Santosh P.; Hall, William Eric, System and method for performing security operations on network data.
  540. Enzmann, Mark J.; Moton, Jr., Robert T.; Zellner, Samuel N., System and method for permission to access mobile location information.
  541. Van Riper, James E.; Miller, Clint; Williams, David K., System and method for planning or monitoring system transformations.
  542. Johnson, William J., System and method for presenting application data by data processing system(s) in a vicinity.
  543. Cheriton, David, System and method for propagating filters.
  544. Cheriton,David, System and method for propagating filters.
  545. Archambeault, Bruce Roy; Rao, Josyula R.; Rohatgi, Pankaj; Scherzer, Helmut, System and method for protecting against leakage of sensitive information from compromising electromagnetic emanations from computing systems.
  546. Libenzi,Davide; Kouznetsov,Victor, System and method for providing passive screening of transient messages in a distributed computing environment.
  547. Boebert, William E.; Rogers, Clyde O.; Andreas, Glenn; Hammond, Scott W.; Gooderum, Mark P., System and method for providing secure internetwork services via an assured pipeline.
  548. Boebert, William E.; Rogers, Clyde O.; Andreas, Glenn; Hammond, Scott W.; Gooderum, Mark P., System and method for providing secure internetwork services via an assured pipeline.
  549. Boebert,William E.; Rogers,Clyde O.; Andreas,Glenn; Hammond,Scott W.; Gooderum,Mark P., System and method for providing secure internetwork services via an assured pipeline.
  550. Applegate John ; Romatoski Jeff, System and method for redirecting network traffic to provide secure communication.
  551. Richardson, John W.; Chouinard, David A.; Chouinard, legal representative, Karen, System and method for regulating communications to or from an application.
  552. Richardson, John W.; Chouinard, David A.; Chouinard, legal representative, Karen, System and method for regulating the flow of information to or from an application.
  553. Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N, System and method for remote control of appliances utilizing mobile location-based applications.
  554. Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N., System and method for remote control of appliances utilizing mobile location-based applications.
  555. Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N., System and method for remote control of appliances utilizing mobile location-based applications.
  556. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  557. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  558. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  559. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Pelly, John; Nakawatase, Ryan Tadashi; Walpole, Thomas Paul, System and method for security information normalization.
  560. Johnson, William J., System and method for service access via hopped wireless mobile device(s).
  561. Johnson, William J., System and method for service-free location based applications.
  562. Johnson, William J.; Johnson, Michael J., System and method for situational proximity observation alerting privileged recipients.
  563. Johnson, William J., System and method for sound wave triggered content.
  564. Johnson, William J., System and method for sudden proximal user interface.
  565. Johnson, William J., System and method for targeting data processing system(s) with data.
  566. Johnson, William J.; Johnson, Jason M., System and method for targeting data processing system(s) with data.
  567. Grimes, Mikal; Corbett, William; Devine, Alex, System and method for the implementation of policies.
  568. Johnson, William J., System and method for timely whereabouts determination by a mobile data processing system.
  569. Thakor, Sanjiv, System and method for transforming configuration commands.
  570. Davis, Mark Bradley, System and method for using a multi-protocol fabric module across a distributed server interconnect fabric.
  571. Musman,Scott Abram, System and method for using agent-based distributed case-based reasoning to manage a computer network.
  572. Musman,Scott A., System and method for using agent-based distributed reasoning to manage a computer network.
  573. Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N, System and method for using location information to execute an action.
  574. Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N., System and method for using location information to execute an action.
  575. Zellner, Samuel N., System and method for using location information to execute an action.
  576. Zellner, Samuel N., System and method for using location information to execute an action.
  577. Johnson, William J.; Johnson, Jason M., System and method for vector processing on behalf of image aperture aim.
  578. Boden Edward B. ; Brzozowski Wesley A. ; Gebler ; Jr. Paul A., System and method for very fast IP packet filtering.
  579. Johnson, William J.; Johnson, Michael J., System and method for vital signs alerting privileged recipients.
  580. Brawn,John Melvin; Jemes,Brian; Froelich,Stephen F., System and method of aggregating discontiguous address ranges into addresses and masks using a plurality of repeating address blocks.
  581. Hubbard, Dan; Tse, Alan, System and method of analyzing web addresses.
  582. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  583. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  584. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  585. Hubbard, Dan, System and method of controlling access to the internet.
  586. Andres, Steven G.; Cole, David M.; Cummings, Thomas Gregory; Garcia, Roberto Ramon; Kenyon, Brian Michael; Kurtz, George R.; McClure, Stuart Cartier; Moore, Christopher William; O'Dea, Michael J.; Saruwatari, Ken D., System and method of managing network security risks.
  587. Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph; Kester, Harold M., System and method of monitoring and controlling application files.
  588. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  589. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  590. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  591. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  592. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  593. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  594. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  595. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  596. Kester, Harold M.; Kester Jones, legal representative, Nicole; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  597. Kester,Harold M.; Hegli,Ronald B.; Dimm,John Ross; Anderson,Mark Richard, System and method of monitoring and controlling application files.
  598. Albert, Anthony; Kawamura, Kyle; Haycock, Keith; Herrmann, Conrad, System and methodology for security policy arbitration.
  599. Teixeira, Steven L., System and methodology providing information lockbox.
  600. Chang, William Ho; Liu, Christina Ying, System for capturing and outputting digital content over a network that includes the internet.
  601. Rigstad, Peter M.; Yoon, John Y.; Farahar, Mark; Subbiah, Barani; Thomsen, Brant D.; Richmond, David E.; Semel, Vered Maor; Bryner, Earl, System for providing firewall capabilities to a communication device.
  602. Donaghey, Robert J.; Carielli, Sandra E.; Helinek, Pamela, System for selecting and disseminating active policies to peer device and discarding policy that is not being requested.
  603. Herrmann, Conrad K., System providing methodology for access control with cooperative enforcement.
  604. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  605. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  606. Minkin, Ilya; Balabine, Igor V.; Eschelbeck, Gerhard, System, method and computer program product for rule based network security policies.
  607. Miller, Randy; Poling, Robert; Pugh, Richard S.; Shapiro, Dmitry, Systems and methods for a protocol gateway.
  608. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen, Systems and methods for additional retransmissions of dropped packets.
  609. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen, Systems and methods for additional retransmissions of dropped packets.
  610. Miller, Randy; Poling, Robert; Pugh, Richard S.; Shapiro, Dmitry, Systems and methods for authentication of target protocol screen names.
  611. Pagan, Florence C. I.; Short, Joel E., Systems and methods for authorizing, authenticating and accounting users having transparent computer access to a network using a gateway device.
  612. Chadda, Sanjay; Samuels, Allen R.; Decasper, Dan S.; Dittia, Zubin; Ankam, Shiva, Systems and methods for bridging a WAN accelerator with a security gateway.
  613. Chadda, Sanjay; Samuels, Allen; DeCasper, Dan; Dittia, Zubin; Ankam, Shiva, Systems and methods for bridging a WAN accelerator with a security gateway.
  614. Panasyuk,Anatoliy; Kramer,Andre; Pedersen,Bradley Jay; Stone,David Sean; Treder,Terry, Systems and methods for continuing an operation interrupted from a reconnection between a client and server.
  615. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for controlling user perceived connection speed.
  616. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  617. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  618. Miller, Randy; Poling, Robert; Pugh, Richard S.; Shapiro, Dmitry, Systems and methods for implementing protocol enforcement rules.
  619. Poling, Robert; Nielsen, Mary; Scott, Robert, Systems and methods for implementing protocol enforcement rules.
  620. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Systems and methods for maintaining a client's network connection thru a change in network identifier.
  621. Panasyuk,Anatoliy; Kramer,Andre; Pedersen,Bradley Jay; Stone,David Sean; Treder,Terry, Systems and methods for maintaining a session between a client and host service.
  622. Miller, Randy; Poling, Robert; Pugh, Richard S.; Shapiro, Dmitry, Systems and methods for managing messages in an enterprise network.
  623. Miller, Randy; Poling, Robert; Pugh, Richard S.; Shapiro, Dmitry, Systems and methods for managing messages in an enterprise network.
  624. Peterson, Matthew T.; Peterson, Daniel F., Systems and methods for managing policies on a computer.
  625. Peterson, Matthew T.; Peterson, Daniel F., Systems and methods for managing policies on a computer.
  626. Peterson, Matthew T.; Peterson, Daniel F., Systems and methods for managing policies on a computer.
  627. Murgia, Marco; Tomlin, Larry; Bojer, Ivan; Kann, Jong; Rafiq, Pierre, Systems and methods for providing a smart group.
  628. Murgia, Marco; Tomlin, Larry; Bojer, Ivan; Kann, Jong; Rafiq, Pierre, Systems and methods for providing a smart group.
  629. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  630. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  631. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing content and services on a network system.
  632. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  633. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  634. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  635. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  636. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  637. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  638. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  639. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  640. Short,Joel E.; Pagan,Florence C. I.; Goldstein,Josh J., Systems and methods for providing dynamic network authorization authentication and accounting.
  641. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing dynamic network authorization, authentication and accounting.
  642. Short, Joel E; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing dynamic network authorization, authentication and accounting.
  643. Short, Joel E.; Delley, Frederic; Logan, Mark F.; Pagan, Florence C. I., Systems and methods for redirecting users having transparent computer access to a network using a gateway device having redirection capability.
  644. Miller,Randy; Poling,Robert; Pugh,Richard S.; Shapiro,Dmitry, Systems and methods for reflecting messages associated with a target protocol within a network.
  645. Shastri, Vijnan; Lee, Lisa; Tran, Trung, Systems and methods for remote rogue protocol enforcement.
  646. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen, Systems and methods for stochastic-based quality of service.
  647. Lum, Stacey C.; Lee, Yuhshiow Alice, Systems and methods of controlling network access.
  648. Lum, Stacey C.; Lee, Yuhshiow Alice, Systems and methods of controlling network access.
  649. Lum, Stacey C.; Lee, Yuhshiow Alice, Systems and methods of controlling network access.
  650. Lum, Stacey C.; Lee, Yuhshiow Alice, Systems and methods of controlling network access.
  651. Lum, Stacey C.; Lee, Yuhshiow Alice, Systems and methods of controlling network access.
  652. Lum, Stacey C.; Lee, Yuhshiow Alice, Systems and methods of controlling network access.
  653. Lum, Stacey C.; Lee, Yuhshiow Alice, Systems and methods of controlling network access.
  654. Lum, Stacey C.; Lee, Yuhshiow Alice, Systems and methods of controlling network access.
  655. Lum, Stacey C.; Lee, Yuhshiow Alice, Systems and methods of controlling network access.
  656. Lum, Stacey C.; Lee, Yuhshiow Alice, Systems and methods of controlling network access.
  657. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen, Systems and methods of using packet boundaries for reduction in timeout prevention.
  658. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen R., Systems and methods of using packet boundaries for reduction in timeout prevention.
  659. Daniely, Gad, Systems for local network security.
  660. Samuels, Allen; Sutter, Paul, TCP selection acknowledgements for communicating delivered and missing data packets.
  661. Pandya,Ashish A., TCP/IP processor and engine using RDMA.
  662. Brahms, Robert; Quinlan, Daniel; Sprosts, Craig, Techniques for determining the reputation of a message sender.
  663. Chang, William Ho; Liu, Christina Ying, Televisions, output controllers, or speakers that are setup to wirelessly connect to a network and to receive digital content from a digital content service over the network.
  664. Signori, David, Topology aware smart merge.
  665. Chang, William Ho; Liu, Christina Ying, Touch sensitive screen information apparatus that includes close proximity or near distance radio frequency field communication.
  666. Chang, William Ho; Liu, Christina Ying, Touch sensitive screen information apparatus that includes close proximity or near distance radio frequency field communication.
  667. Samuels, Allen R.; Sutter, Paul G., Transaction boundary detection for reduction in timeout penalties.
  668. Tor, Yair; Neystadt, Eugene (John); Schnell, Patrik; Ananiev, Oleg; Zavalkovsky, Arthur; Rose, Daniel, Trusted intermediary for network layer claims-enabled access control.
  669. Novak, Mark; Tor, Yair; Neystadt, Eugene; Yassour, Yoav; Efron, Alexey; Ortal, Amos; Alon, Daniel; Didi, Ran, Trustworthy device claims for enterprise applications.
  670. Merritt, Anne Marie; Swortwood, William H., Tunneling management messages over a channel architecture network.
  671. Freskos, Mark A.; Hawke, Michelle D.; Jain, Dhanendra; Jain, Kapil; Letchworth, Charles M.; McDonnell, Neal; Movassaghi, Yassin; Puvvala, Sukumar; Xie, Xiaobing; Ward, David D., Two-stage network device configuration process.
  672. Warman, Leon; Pearson, Malcolm E.; Kuznetsov, Andrei; Waddoups, Nathan F.; Tribble, Eric D., Updating configuration information to a perimeter network.
  673. Odom, Gary, User selectable signature.
  674. Hu, Wei; Li, Yunrui; Loaiza, Juan R., Using a standby data storage system to detect the health of a cluster of data storage servers.
  675. Chen, Jyshyang, VPN and firewall integrated system.
  676. Ahlstrom John K. ; Schleimer Stephen I., Verifying that a network management policy used by a computer system can be satisfied and is feasible for use.
  677. Della-Libera, Giovanni M.; Kaler, Christopher G.; Konersmann, Scott A.; Lampson, Butler W.; Leach, Paul J.; Lovering, Bradford H.; Lucco, Steven E.; Millet, Stephen J.; Rashid, Richard F.; Shewchuk, John P., Virtual distributed security system.
  678. Della-Libera, Giovanni M.; Kaler, Christopher G.; Konersmann, Scott A.; Lampson, Butler W.; Leach, Paul J.; Lovering, Bradford H.; Lucco, Steven E.; Millet, Stephen J.; Rashid, Richard F.; Shewchuk, John P., Virtual distributed security system.
  679. Della-Libera, Giovanni M.; Kaler, Christopher G.; Konersmann, Scott A.; Lampson, Butler W.; Leach, Paul J.; Lovering, Bradford H.; Lucco, Steven E.; Millet, Stephen J.; Rashid, Richard F.; Shewchuk, John P., Virtual distributed security system.
  680. Della-Libera, Giovanni M.; Kaler, Christopher G.; Konersmann, Scott A.; Lampson, Butler W.; Leach, Paul J.; Lovering, Bradford H.; Luocco, Steven E.; Millet, Stephen J.; Rashid, Richard F.; Shewchuk, John P., Virtual distributed security system.
  681. John L. Pedersen, Virtual path concentrator node with loopback.
  682. Boden, Edward B.; Palermo, Donald A., Virtual private network and tunnel gateway with multiple overlapping, remote subnets.
  683. Boden,Edward B.; Palermo,Donald A., Virtual private network and tunnel gateway with multiple overlapping, remote subnets.
  684. Cheng, Pau-Chen; D'Sa, Ajit Clarence; Feng, Jian Hua; Genty, Denise Marie; Wilson, Jacqueline Hegedus, Virtual private network with multiple tunnels associated with one group name.
  685. Samuels, Allen R.; Sutter, Paul G., Wavefront detection and disambiguation of acknowledgements.
  686. Samuels, Allen R.; Sutter, Paul G., Wavefront detection and disambiguation of acknowledgements.
  687. Samuels, Allen R.; Sutter, Paul G., Wavefront detection and disambiguation of acknowledgments.
  688. Chang, William Ho; Liu, Christina Ying, Wireless controller wire connectable to output devices such as televisions for accessing digital content and for wireless communication with mobile information apparatus.
  689. Rygaard,Christopher A., Wireless device mobile application security system.
  690. Chang, William Ho; Liu, Christina Ying, Wireless devices that communicate, via short range wireless communication, with a mobile client device for establishing services of the wireless device with a server over the internet.
  691. Chang, William Ho; Liu, Christina Ying, Wireless devices that establish a wireless connection with a mobile information apparatus by wirelessly detecting, within physical proximity, the mobile information apparatus.
  692. Billhartz,Thomas Jay, Wireless local or metropolitan area network with intrusion detection features and related methods.
  693. Chang, William Ho; Liu, Christina Ying, Wireless output devices or wireless controllers that support wireless device discovery for establishing wireless connectivity.
  694. Chang, William Ho; Liu, Christina Ying, Wireless printing device for printing digital content received via wireless communication compatible, at least partly, with IEEE 802.11 or Bluetooth.
  695. Chang, William Ho; Liu, Christina Ying, Wireless television or controller wire connectable to a television for receiving and rendering digital content.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로