$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and methodology for managing internet access on a per application basis for client computers connected to the int 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-013/00
출원번호 US-0851777 (1997-05-06)
발명자 / 주소
  • Freund Gregor
출원인 / 주소
  • Zone Labs, Inc.
대리인 / 주소
    Smart
인용정보 피인용 횟수 : 1018  인용 특허 : 13

초록

A computing environment with methods for monitoring access to an open network, such as a WAN or the Internet, is described. The system includes one or more clients, each operating applications or processes (e.g., Netscape Navigator.TM. or Microsoft Internet Explorer.TM. browser software) requiring I

대표청구항

[ What is claimed is:] [26.] A computer system regulating access by client computers comprising:a plurality of client computers which can connect to at least one open network;supervisor means provided at a computer which is in communication with each client computer to be regulated, said supervisor

이 특허에 인용된 특허 (13)

  1. Vu Hung T. (Ottawa CAX), Apparatus and method for providing a secure gateway for communication and data exchanges between networks.
  2. Tran Trung M., Auditing login activity in a distributed computing environment.
  3. Blakely ; III George Robert ; Milman Ivan Matthew ; Sigler Wayne Dube, Configurable password integrity servers for use in a shared resource environment.
  4. Shi Shaw-Ben ; Ault Michael Bradford ; Plassmann Ernst Robert ; Rich Bruce Arland ; Rosiles Mickella Ann ; Shrader Theodore Jack London, Distributed file system web server user authentication with cookies.
  5. Swinehart Daniel C. (Palo Alto CA) Terry Douglas B. (San Carlos CA), Garbage collector for hypermedia systems.
  6. Hu Wei-Ming (Arlington MA), Method and apparatus for authenticating a client to a server in computer systems which support different security mechan.
  7. Belville Daniel R. ; Goble George R., Method and system for allowing remote procedure calls through a network firewall.
  8. Christensen Erik B. ; Lovering Bradford H., Method and system for remote automation of object oriented applications.
  9. Waldo James H. (Dracut MA) Arnold Kenneth C. (Newton Centre MA) Erdos Marlena E. (Somerville MA) Robinson Douglas B. (Hollis NH) Hoffman D. Jeffrey (Nashua NH) Smith Lamar D. (San Jose CA) Showman Pe, Object oriented distributed computing system processing request to other object model with code mapping by object manage.
  10. Blakley ; III George Robert ; Milman Ivan Matthew ; Sigler Wayne Dube, Propagating plain-text passwords from a main registry to a plurality of foreign registries.
  11. Fortinsky Michael S.,ILX, Provision of secure access to external resources from a distributed computing environment.
  12. Kells Timothy Roger ; Peebles Thomas Frank, System and method for supporting distributed computing mechanisms in a local area network server environment.
  13. Blackwell ; Jr. William C. ; Alston Robin,GBX ; Farrington Kevin M., Web application server with secure common gateway interface.

이 특허를 인용한 특허 (1018)

  1. Hannel, Clifford Lee; May, Anthony, Access control.
  2. Boucher, Peter; Wright, Michael; Cranny, Tim; Nault, Gabe; Smith, Merrill, Access control to files based on source information.
  3. Kling, John; Thompson, Bryan; Green, Ward, Access requests at IAM system implementing IAM data model.
  4. Kling, John; Thompson, Bryan; Green, Ward, Access requests at IAM system implementing IAM data model.
  5. Kling, John; Thompson, Bryan; Green, Ward, Access requests at IAM system implementing IAM data model.
  6. Kumar, Srinivas; Bettadapura, Vijayashree S.; Shah, Shadab Munam, Access, priority and bandwidth management based on application identity.
  7. Ramchandran, Amit, Adaptable datapath for a digital processing system.
  8. Ramchandran, Amit, Adaptable datapath for a digital processing system.
  9. Ramchandran, Amit, Adaptable datapath for a digital processing system.
  10. Ramchandran, Amit, Adaptable datapath for a digital processing system.
  11. Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter J., Adaptive integrated circuitry with heterogeneous and reconfigurable matrices of diverse and adaptive computational units having fixed, application specific computational elements.
  12. Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter J., Adaptive integrated circuitry with heterogeneous and reconfigurable matrices of diverse and adaptive computational units having fixed, application specific computational elements.
  13. Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter James, Adaptive integrated circuitry with heterogeneous and reconfigurable matrices of diverse and adaptive computational units having fixed, application specific computational elements.
  14. Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter James, Adaptive integrated circuitry with heterogenous and reconfigurable matrices of diverse and adaptive computational units having fixed, application specific computational elements.
  15. Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter James, Adaptive processor for performing an operation with simple and complex units each comprising configurably interconnected heterogeneous elements.
  16. Pitroda, Satyan G.; Desai, Mehul, Administering a plurality of accounts for a client.
  17. Jerger Michael S. ; Bisset Jeffrey A. ; Sinclair Craig T. ; Toutonghi Michael J., Administering permissions associated with a security zone in a computer system security model.
  18. Wright, Michael; Boucher, Peter; Nault, Gabe; Smith, Merrill; Jacobson, Sterling K.; Wood, Jonathan; Mims, Robert, Administration of protection of data accessible by a mobile device.
  19. Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Administration of protection of data accessible by a mobile device.
  20. CP, Chandan; Narasimhan, Srinivasan, Agent assisted malicious application blocking in a network environment.
  21. Cp, Chandan; Narasimhan, Srinivasan, Agent assisted malicious application blocking in a network environment.
  22. Pitroda, Satyan G.; Desai, Mehul, Aggregating a user's transactions across a plurality of service institutions.
  23. van der Made, Peter A. J., Analytical virtual machine.
  24. van der Made,Peter A. J., Analytical virtual machine.
  25. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  26. Master, Paul L.; Uvacek, Bohumir, Apparatus and method for adaptive multimedia reception and transmission in communication environments.
  27. Ahmavaara, Kalle I., Apparatus and method for bundling application services with inbuilt connectivity management.
  28. Tungatkar, Gaurav Sharad, Apparatus and method for controlling network access for applications on mobile terminals.
  29. Doviak, William; Whitmore, David L.; Houvig, Flex, Apparatus and method for intelligent routing of data between a remote device and a host system.
  30. Fellenstein,Craig William; Gusler,Carl Phillip; Hamilton, II,Rick Allen; Schatz,Harry, Apparatus and method for monitoring and analyzing instant messaging account transcripts.
  31. Fellenstein,Craig William; Gusler,Carl Phillip; Hamilton, II,Rick Allen; Schatz,Harry, Apparatus and method for monitoring instant messaging accounts.
  32. Fok, Kenny; Cassett, Tia Manning; Hwang, Jihyun, Apparatus and methods for managing content exchange on a wireless device.
  33. Haitsuka, Stacy; Burr, Ronald; MacKenzie, Harold; Zebian, Marwan; Warren, Terry; Blaser, Shane, Apparatus for monitoring individual internet usage.
  34. Boulanger, Alan David; Danford, Robert William; Himberger, Kevin David; Jeffries, Clark Debs, Apparatus, method and program to detect and control deleterious code (virus) in computer network.
  35. Ando, Mitsuo, Apparatus, method, and computer-readable recording medium for access control.
  36. Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, method, system and executable module for configuration and operation of adaptive integrated circuitry having fixed, application specific computational elements.
  37. Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, method, system and executable module for configuration and operation of adaptive integrated circuitry having fixed, application specific computational elements.
  38. Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, method, system and executable module for configuration and operation of adaptive integrated circuitry having fixed, application specific computational elements.
  39. Burman, Kevin; Alderucci, Dean P., Apparatus, processes and articles for facilitating mobile gaming.
  40. Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, system and method for configuration of adaptive integrated circuitry having fixed, application specific computational elements.
  41. Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, system and method for configuration of adaptive integrated circuitry having heterogeneous computational elements.
  42. Sharma, Rosen; Bhargava, Rishi; Vittal, Chiradeep; Eranky, Shyam, Application change control.
  43. Bender, Christopher Lyle; Russell, Graham; Silvanovich, Natalie Michelle, Associating services to perimeters.
  44. Bender, Christopher Lyle; Russell, Graham; Silvanovich, Natalie Michelle, Associating services to perimeters.
  45. Ramos, Aurelio Rafael, Audio output balancing.
  46. Ramos, Aurelio Rafael, Audio output balancing.
  47. Ramos, Aurelio Rafael; Sheen, Timothy W., Audio output balancing.
  48. Ramos, Aurelio Rafael; Sheen, Timothy W., Audio output balancing.
  49. Buzuloiu, Vasile; Cuic, Mihai; Beuran, Razvan; Grecu, Horia; Drimbarean, Alexandru; Corcoran, Peter; Steinberg, Eran, Automated detection of pornographic images.
  50. Buzuloiu,Vasile; Cuic,Mihai; Beuran,Razvan; Grecu,Horia; Drimbarean,Alexandru; Corcoran,Peter; Steinberg,Eran, Automated detection of pornographic images.
  51. Shekyan, Sergey; Coates, Michael; Hales, Wesley; Peacock, Tim; Call, Justin, Automated hardening of web page content.
  52. Bhagwat, Pravin; Gogate, Shantanu; King, David C, Automated method and system for monitoring local area computer networks for unauthorized wireless access.
  53. Bhagwat, Pravin; Gogate, Shantanu; King, David C., Automated method and system for monitoring local area computer networks for unauthorized wireless access.
  54. Bhagwat, Pravin; Gogate, Shantanu; King, David C., Automated sniffer apparatus and method for monitoring computer systems for unauthorized access.
  55. Huang, Yuming; Kumar, Suresh W G; Peto, David J., Automatic connectivity determiner and configurator.
  56. Jackson, David B., Automatic workload transfer to an on-demand center.
  57. Bassett, Charles D.; Yariv, Eran; Carbaugh, Ian M.; Koppolu, Lokesh Srinivas; Noy, Maksim; Wahlert, Sarah A.; Bahl, Pradeep, Automatically generating rules for connection security.
  58. Bassett, Charles D.; Yariv, Eran; Carbaugh, Ian M.; Koppolu, Lokesh Srinivas; Noy, Maksim; Wahlert, Sarah A.; Bahl, Pradeep, Automatically generating rules for connection security.
  59. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Automatically reconnecting a client across reliable and persistent communication sessions.
  60. Alderucci, Dean P.; Asher, Joseph M.; Papageorgiou, Antonio, Biometric access data encryption.
  61. Alderucci, Dean P.; Asher, Joseph M.; Papageorgiou, Antonio, Biometric access sensitivity.
  62. Alderucci, Dean P.; Asher, Joseph M.; Papageorgiou, Antonio, Biometric access sensitivity.
  63. Satyavolu, Ramakrishna, Categorization of summarized information.
  64. Millington, Nicholas A. J., Causing a device to join a synchrony group.
  65. Millington, Nicholas A. J, Ceasing playback among a plurality of playback devices.
  66. Bender, Christopher Lyle; Storozuk, John Vincent; Ho, Alan Pak-Lun; Tse, Chi Chiu, Certificate management method based on connectivity and policy.
  67. Bender, Christopher Lyle; Stotozuk, John Vincent; Ho, Alan Pak-Lun; Tse, Chi Chiu, Certificate management method based on connectivity and policy.
  68. Sebes, E. John; Bhargava, Rishi, Classification of software on networked systems.
  69. Sebes, E. John; Bhargava, Rishi, Classification of software on networked systems.
  70. Meenan,Patrick; Damick,Jeffrey Joseph, Classifying devices using a local proxy server.
  71. Heard,Robert W.; Mann,Dwayne R.; Burchett,Christopher D.; Gordon,Ian R., Client architecture for portable device with security policies.
  72. Klein, John; Herrod, Allan; Woloschin, Steven, Client-server software for controlling data collection device from host computer.
  73. Susaki Seiichi,JPX ; Umeki Hisashi,JPX ; Umezawa Katsuyuki,JPX ; Miyazaki Seiji,JPX ; Matsunaga Kazuo,JPX ; Kitagawa Makoto,JPX, Client-server system for controlling access rights to certain services by a user of a client terminal.
  74. Hosoe, Makoto, Client-server system, server access authentication method, memory medium stores server-access authentication programs, and issuance device which issues the memory medium contents.
  75. Jackowski Steven J. ; Thomas Christopher N., Client-side application-classifier gathering network-traffic statistics and application and user names using extensible-service provider plugin for policy-based network control.
  76. Bluestone, Derek; Adams, Clint; Yalamarti, Srinivas; Lebel, Pierre-Philippe, Client-side network access policies and management applications.
  77. Wolfe, Mark A., Client-side processing of preload operations.
  78. Hidayat, Ariya, Client/server polymorphism using polymorphic hooks.
  79. Call, Justin, Client/server security by an intermediary rendering modified in-memory objects.
  80. Call, Justin, Client/server security by an intermediary rendering modified in-memory objects.
  81. Millington, Nicholas A. J., Clock rate adjustment in a multi-zone system.
  82. Kling, John H.; Barbir, Abdulkader; Frick, Cynthia A.; Marian, Radu; Ritchey, Ronald W., Common data model for identity access management data.
  83. Wolfe, Mark A., Communicating information relating to a network resource.
  84. Wolfe, Mark A., Communicating information relating to a network resource.
  85. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  86. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  87. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  88. Jason, Jr.,James L.; Saint Hilaire,Ylian, Communication system including a security system.
  89. Heidari, Ghobad; Chang, Kuor Hsin; Master, Paul L.; Hogenauer, Eugene B.; Scheuermann, Walter James, Communications module, device, and method for implementing a system acquisition function.
  90. Culbreth, Aaron; Ahdieh, II, Keumars A.; Wiest, Peter M.; Toll, Roderick M.; Wynn, Roger H.; Pennington, Stan Dale; Gill, Timothy Arthur, Compliance interface for compliant applications.
  91. Culbreth, Aaron; Ahdieh, II, Keumars A.; Wiest, Peter M.; Toll, Roderick M.; Wynn, Roger H.; Pennington, Stan Dale; Gill, Timothy Arthur, Compliance interface for compliant applications.
  92. Khanolkar, Rajeev; Azim, Ozakil; Asthana, Rishi; Ved, Niten; Hanrahan, Kevin; Ghildiyal, Amit; Pogaku, Shirisha; Amaratunge, Dhani; Samavenkata, K. V. Rao; Hamid, Araf Karsh, Comprehensive security structure platform for network managers.
  93. Khanolkar,Rajeev; Azim,Ozakil; Asthana,Rishi; Ved,Niten; Hanrahan,Kevin; Ghildiyal,Amit; Pogaku,Shirisha; Amaratunge,Dhani; Samavenkata,K. V. Rao; Hamid,Aral Rarsh, Comprehensive security structure platform for network managers.
  94. Lotvin,Mikhail; Nemes,Richard Michael, Computer apparatus and methods supporting different categories of users.
  95. van der Made,Peter A. J., Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine.
  96. van der Made, Peter A. J., Computer immune system and method for detecting unwanted code in a computer system.
  97. van der Made,Peter A. J, Computer immune system and method for detecting unwanted code in a computer system.
  98. Oswald, David L., Computer monitor receiver.
  99. Fukasawa,Mikio, Computer monitoring system.
  100. Brownlie Michael,CAX ; Hillier Stephen,CAX ; Van Oorschot Paul C.,CAX, Computer network security system and method having unilateral enforceable security policy provision.
  101. Brownlie,Michael; Hillier,Stephen; Van Oorschot,Paul C., Computer network security system and method having unilateral enforceable security policy provision.
  102. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  103. Butler, Daniel Earl; Johnson, E. Dywayne, Computer program, method, and system for preventing execution of viruses and malware.
  104. Shostack Adam ; Allouch David,ILX, Computer security.
  105. Pollutro, Dennis Vance; Tran, Kiet Tuan; Kumar, Srinivas, Computer security system.
  106. Pollutro, Dennis Vance; Tran, Kiet Tuan; Kumar, Srinivas, Computer security system.
  107. Amdur, Eugene; Flint, Andrew; Lamb, Steven; Kotsopoulos, Steve; Reid, Irving; Koch, C. Harald; Szyszkowski, Andrzej; Fernandes, Laryn-Joe, Computer system security service.
  108. Hassan, Ahmed E.; Chiu, Denny; Wilson, John Ferguson, Computing device with environment aware features.
  109. DeLuca, Michael Joseph, Computing devices and methods for resetting inactivity timers on computing devices.
  110. Moloian, Armen; Ritchey, Ronald W., Computing resource inventory system.
  111. Moloian, Armen; Ritchey, Ronald W., Computing resource inventory system.
  112. Alderucci, Dean P.; Asher, Joseph M.; Papageorgiou, Antonio, Conditional biometric access in a gaming environment.
  113. Alderucci, Dean P.; Asher, Joseph M.; Papageorgiou, Antonio, Conditional biometric access in a gaming environment.
  114. Master, Paul L.; Watson, John, Configurable hardware based digital imaging apparatus.
  115. Kallai, Christopher; Ericson, Michael Darrell Andrew; Lang, Jonathan P.; Wisneski, Craig; Reilly, Jonathon; Daly, Seamus; Mansfield, Todd, Configuration based on speaker orientation.
  116. Bestmann, Martin; Cartier, Jeremy; Miltner, Jens, Configuration of third party applications in a sandboxed environment.
  117. Desai, Mehul; Pitroda, Satyan G.; Maniar, Nehal, Configuring a plurality of security isolated wallet containers on a single mobile device.
  118. Sebes, E. John; Bhargava, Rishi; Reese, David P., Connectivity-based authorization.
  119. Mathew,Ashvin J.; Vetrivel,Puhazholi; Jones,Brian; Zhang,Danpo; Abbott,Laurel S.; Paya,Cem; Dunn,Melissa, Consent mechanism for online entities.
  120. Hiraga,Masaki, Contents filtering method, contents filtering apparatus and contents filtering program.
  121. Scheuermann, W. James; Hogenauer, Eugene B., Control node for multi-core system.
  122. Chebolu, Anil Kumar; Hill, Timothy A.; McMenamin, Marie Louise; Patrawala, Zakir S.; Virani, Samira S., Controlling user-access to computer applications.
  123. Hernoud, Melani S.; Pierce, Elizabeth J.; Reith, Gregory, Converged logical and physical security.
  124. Bartlett, Jeannine A.; Rozenberg, Yigal, Cooperative processing and escalation in a multi-node application-layer security system and method.
  125. Houston, John S., Cooperative system for measuring electronic media.
  126. Houston, John S., Cooperative system for measuring electronic media.
  127. John S. Houston, Cooperative system for measuring electronic media.
  128. Marejka,Richard; Birkbeck,Guy; Dabrowski,Dariusz, Customer-based service system including a cascaded pipeline with self-monitoring relays.
  129. Wassom, Jack; Schaefer, Renee; Chandler, Cory, Customized user interface.
  130. Wassom, Jack; Schaefer, Renee; Chandler, Cory, Customized user interface.
  131. Kimball, Jeffrey David; Wassom, Jr., John Thurston; Dolan, Christina Ann Rank, Customized user interface based on user profile information.
  132. Kimball,Jeffrey David; Wassom, Jr.,John Thurston; Dolan,Christina Ann Rank, Customized user interface based on user record information.
  133. Kimball, Jeffrey David; Wassom, Jr., John Thurston; Dolan, Christina Ann Rank, Customized user interface for subordinate users.
  134. Kimball, Jeffrey David; Wassom, Jr., John Thurston; Dolan, Christina Ann Rank, Customizing user interfaces.
  135. Kimball, Jeffrey David; Wassom, Jr., John Thurston; Dolan, Christina Ann Rank, Customizing user interfaces based on user activities.
  136. Pitroda, Satyan G.; Desai, Mehul, Data consolidation expert system for facilitating user control over information use.
  137. Berstis, Viktors, Data processing system and method for accessing files.
  138. Bender, Christopher Lyle; Tu, Van Quy; Major, Daniel Jonas; Cardy, Jonathan Raymond, Data source based application sandboxing.
  139. Selman, Daniel; Bergman, Robert; O'Neil, Edward K., Data synchronization.
  140. Selman,Daniel; Bergman,Robert; O'Neil,Edward K., Data synchronization.
  141. Valente,Luis Filipe Pereira; Cooper,Geoffrey Howard; Shaw,Robert Allen; Sherlock,Kieran Gerard, Declarative language for specifying a security policy.
  142. Michael S. Jerger ; Jeffrey A. Bisset ; Craig T. Sinclair ; Michael J. Toutonghi, Declarative permission requests in a computer system.
  143. Sherman, David L.; Sterne, Daniel F.; Lawler, Geoffrey T.; Heyman, Michael D., Decryption system and method for network analyzers and security programs.
  144. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Delegated administration for a distributed security system.
  145. Desai, Mehul; Pitroda, Satyan G.; Maniar, Nehal, Deploying an issuer-specific widget to a secure wallet container on a client device.
  146. Ho, Alan Pak-Lun; Tse, Chi Chiu; Nagarajan, Sivakumar; Mueller, Michael Jonathan, Designation of classes for certificates and keys.
  147. Wetherall, David J.; Savage, Stefan R.; Anderson, Thomas E., Detecting and preventing undesirable network traffic from being sourced out of a network domain.
  148. LeMond, Jennifer; Duan, Haoyang; Wang, Xiaoming, Detecting anomalous accounts using event logs.
  149. Lemond, Jennifer; Duan, Haoyang; Wang, Xiaoming, Detecting anomalous accounts using event logs.
  150. Martin, Hamish D S; Brown, Ronald; Pearce, Mark A, Detection of an attack such as a pre-attack on a computer network.
  151. Bowman Amuah,Michel K., Development architecture framework.
  152. Gelman, Geoffrey M.; Rushin, Ronald; Alderucci, Dean P.; Asher, Joseph M., Device detection.
  153. Jones, Kevin Brian; Pointon, Richard, Device internet resource access filtering system and method.
  154. Beadles,Mark A.; Emerick,William S.; Russo,Kevin A.; Mulh,Kenneth E.; Bell,Raymond J., Device plug-in system for configuring network device over a public network.
  155. Gelman, Geoffrey M.; Rushin, Ronald; Alderucci, Dean P.; Asher, Joseph M., Device with time varying signal.
  156. Pitroda, Satyan G.; Desai, Mehul, Direct personal mobile device user to service provider secure transaction channel.
  157. Pitroda, Satyan G.; Desai, Mehul, Direct user to ticketing service provider secure transaction channel.
  158. Michael S. Jerger ; Jeffrey A. Bisset ; Craig T. Sinclair ; Michael J. Toutonghi, Directional set operations for permission based security in a computer system.
  159. Millington, Nicholas A. J., Disengaging and engaging zone players.
  160. Schneider, David S.; Ribet, Michael B.; Lipstone, Laurence R.; Jensen, Daniel, Distributed administration of access to information and interface for same.
  161. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Distributed enterprise security system.
  162. Roberts, David A., Distributed firewall implementation and control.
  163. Guo,Yi, Distributed network monitoring system and method.
  164. Dong, Thomas Z.; Spohrer, Daniel Thomas; Srinivasa, Vijay; Williams, Jamie Richard, Distributive data capture.
  165. Kirsch,Steven T., Document retrieval system with access control.
  166. Teng, Joan C.; Remahl, Thomas B., Domain based workflows.
  167. Teng, Joan C.; Remahl, Thomas B., Domain based workflows.
  168. Becker Hof, Onno Mark, Domain-less service selection.
  169. Becker Hof, Onno Mark, Domain-less service selection.
  170. Ahlander, John Lyman; Fonnesbeck, J. Michael; Toone, Nathan David; Valimaki, Mikko, Dynamic background rater for internet content.
  171. Erickson, Thomas D.; Kellogg, Wendy A.; Malkin, Peter K.; Richards, John T.; Yu, Philip S., Dynamic behavior-based access control system and method.
  172. Carroll, Patrick Colum; Schorr, Judd Adam; Trevathan, Matthew Bunkley; Yochem, Angela Jo; Yochem, Daniel Joseph, Dynamic control of authorization to access internet services.
  173. Carroll,Patrick Colum; Schorr,Judd Adam; Trevathan,Matthew Bunkley; Yochem,Angela Jo; Yochem,Daniel Joseph, Dynamic control of authorization to access internet services.
  174. Gilgen David Blair, Dynamic program suspension.
  175. Mackin, Kelly Jolie, Dynamic threat event management system and method.
  176. Cardamore, Daniel; May, Darrell Reginald; Nagarajan, Sivakumar; Cherry, Carl Lloyd, Dynamically generating perimeters.
  177. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Dynamically modifying a toolbar.
  178. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Dynamically modifying a toolbar.
  179. Irlam,Gordon Raymond; Maggi,Brian; Petry,Scott, E-mail filtering services and e-mail service enrollment techniques.
  180. Petry,Scott M.; Irlam,Gordon R.; Maggi,Brian, E-mail filtering services using Internet protocol routing information.
  181. Petry, Scott M.; Akamine, Shinya; Lund, Peter Kevin; Cox, Fred; Oswall, Michael John, E-mail management services.
  182. Petry,Scott; Irlam,Gordon Raymond; Maggi,Brian, E-mail policy compliance techniques.
  183. Jackson, David B., Elastic management of compute resources between a web server and an on-demand compute environment.
  184. Petry, Scott M.; Irlam, Gordon R.; Maggi, Brian, Electronic document policy compliance techniques.
  185. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Electronic message source reputation information system.
  186. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Electronic message source reputation information system.
  187. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Electronic message source reputation information system.
  188. Hodge, Stephen; Woody, David, Electronic messaging exchange.
  189. Hodge, Stephen; Woody, David, Electronic messaging exchange.
  190. Hodge, Stephen; Woody, David, Electronic messaging exchange.
  191. Hodge, Stephen; Woody, David, Electronic messaging exchange.
  192. Hodge, Stephen; Woody, David, Electronic messaging exchange.
  193. Hodge, Stephen; Woody, David, Electronic messaging exchange.
  194. Hodge, Stephen; Woody, David, Electronic messaging exchange.
  195. Hodge, Stephen; Woody, David, Electronic messaging exchange.
  196. Sinn, Richard P.; Teng, Joan C.; Remahl, Thomas B., Employing electronic certificate workflows.
  197. Sinn, Richard P., Employing job code attributes in provisioning.
  198. Gossain, Hrishikesh; Tober, Benjamin Ari, Enabling components of a playback device.
  199. Panasyuk, Anatoliy; Pedersen, Bradley J.; Stone, David; Treder, Terry, Encapsulating protocol for session persistence and reliability.
  200. Lim, Keng, Enforcing access control policies on servers in an information management system.
  201. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  202. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  203. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  204. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  205. Lim, Keng, Enforcing application and access control policies in an information management system with two or more interactive enforcement points.
  206. Lim, Keng, Enforcing application and access control policies in an information management system with two or more interactive enforcement points.
  207. Lim, Keng, Enforcing control policies in an information management system.
  208. Lim, Keng, Enforcing control policies in an information management system with two or more interactive enforcement points.
  209. Lim, Keng, Enforcing document control in an information management system.
  210. Lim, Keng, Enforcing policy-based application and access control in an information management system.
  211. Lim, Keng, Enforcing policy-based application and access control in an information management system.
  212. Lim, Keng, Enforcing policy-based application and access control in an information management system.
  213. Lim, Keng, Enforcing policy-based application and access control in an information management system.
  214. Lim, Keng, Enforcing universal access control in an information management system.
  215. Lim, Keng, Enforcing universal access control in an information management system.
  216. Lim, Keng, Enforcing universal access control in an information management system.
  217. Lim, Keng, Enforcing universal access control in an information management system.
  218. Plummer, David W., Enhanced browser security.
  219. Griffin,Philip B.; Hallock,Troy; Posner,Brad; Osborne,Patrick; Libouban,Olivier; Devgan,Manish; Rohra,Ravi; Gupta,Jitendra; Sengupta,Somenath; Ma,Hung T.; Lin,Chengjiang, Enterprise application platform.
  220. Griffin,Philip B.; Hallock,Troy; Posner,Brad; Osborne,Patrick; Libouban,Olivier; Devgan,Manish; Rohra,Ravi; Gupta,Jitendra; Sengupta,Somenath; Ma,Hung T.; Lin,Chengjiang C., Enterprise application platform.
  221. Their, Adam; Sandles, Jon M.; Pearson, Duncan, Enterprise planning.
  222. Millington, Nicholas A. J.; Hainsworth, Paul V., Establishing a secure wireless network with a minimum human intervention.
  223. Millington, Nicholas A. J.; Hainsworth, Paul V., Establishing a secure wireless network with minimum human intervention.
  224. Pitroda, Satyan G.; Desai, Mehul, Establishing direct, secure transaction channels between a device and a plurality of service providers.
  225. Pitroda, Satyan G.; Desai, Mehul, Establishing direct, secure transaction channels between a device and a plurality of service providers via personalized tokens.
  226. Pitroda, Satyan G.; Desai, Mehul, Establishing trust for conducting direct secure electronic transactions between a user and service providers.
  227. Cousins, William R.; Badias, Franz; Means, William S., Event occurrence detection method and apparatus.
  228. Abzarian, David; Tamasi, David C.; Horton, Noah, Exceptions grouping.
  229. Bhargava, Rishi; Sebes, E. John, Execution environment file inventory.
  230. Desai, Mehul; Pitroda, Satyan G.; Maniar, Nehal, Expert engine tier for adapting transaction-specific user requirements and transaction record handling.
  231. Furtek, Frederick Curtis; Master, Paul L., External memory controller.
  232. Furtek, Frederick Curtis; Master, Paul L., External memory controller node.
  233. Furtek, Fredrick Curtis; Master, Paul L., External memory controller node.
  234. Furtek, Fredrick Curtis; Master, Paul L., External memory controller node.
  235. Pantuso, Joseph J.; Schneider, Ryan L., Extractor system, method and computer program product for managing network access on a per-application basis.
  236. Pantuso,Joseph J.; Schneider,Ryan L., Extractor system, method and computer program product for managing network access on a per-application basis.
  237. Pitroda, Satyan G.; Desai, Mehul, Facilitating a secure transaction over a direct secure transaction channel.
  238. Pitroda, Satyan G.; Desai, Mehul, Facilitating a secure transaction over a direct secure transaction portal.
  239. Pitroda, Satyan G.; Desai, Mehul, Facilitating establishing trust for a conducting direct secure electronic transactions between a user and a financial service providers.
  240. Pitroda, Satyan G.; Desai, Mehul, Facilitating establishing trust for conducting direct secure electronic transactions between a user and airtime service providers.
  241. Pitroda, Satyan G.; Desai, Mehul, Facilitating establishing trust for conducting direct secure electronic transactions between users and service providers via a mobile wallet.
  242. Moloian, Armen; Ritchey, Ronald W., Facilitating separation-of-duties when provisioning access rights in a computing system.
  243. Owen, James; Smith, Gregory P.; McCauley, Rodney; Toussaint, Alexandre; Conti, Joseph; Patadia, Jalpesh, Federated management of content repositories.
  244. Owen,James; Smith,Gregory; McCauley,Rodney; Toussaint,Alexander; Conti,Joseph; Patadia,Jalpesh, Federated management of content repositories.
  245. Haviv,Yaron; Corem,Guy, Filtered application-to-application communication.
  246. Ahlander, John Lyman; Valimaki, Mikko, Filtering cached content based on embedded URLs.
  247. Hegli, Ronald Bjorn; Lonas, Jr., Hal Case; Kester, Harold, Filtering techniques for managing access to internet sites or other software applications.
  248. Hegli,Ronald Bjorn; Lonas, Jr.,Hal Case; Kester,Harold, Filtering techniques for managing access to internet sites or other software applications.
  249. Malcolm,Jerry Walter, Firewall protocol providing additional information.
  250. Dowd Patrick William ; Mchenry John Thomas, Firewall security apparatus for high-speed circuit switched networks.
  251. Cheswick William Roberts ; Whitten Edward G., Firewall security method and apparatus.
  252. Kortum, Philip; Sullivan, Marc A., Firewall switching system for communication system applications.
  253. Lee, Dong-Hyuk, Flexible network security system and method for permitting trusted process.
  254. Kallai, Christopher; Ericson, Michael Darrell Andrew; Lang, Jonathan P.; Wisneski, Craig; Reilly, Jonathon; Daly, Seamus; Mansfield, Todd, Frequency routing based on orientation.
  255. Kallai, Christopher; Ericson, Michael Darrell Andrew; Lang, Jonathan P.; Wisneski, Craig; Reilly, Jonathon; Daly, Seamus; Mansfield, Todd, Frequency routing based on orientation.
  256. Asher, Joseph M.; Rushin, Ron; Alderucci, Dean P.; Gelman, Geoffrey M., Game access device.
  257. Asher, Joseph M.; Rushin, Ron; Alderucci, Dean P.; Gelman, Geoffrey M., Game access device with privileges.
  258. Gelman, Geoffrey M.; Rushin, Ronald; Alderucci, Dean P.; Asher, Joseph M., Game access device with time varying signal.
  259. Gelman, Geoffrey M.; Rushin, Ronald; Alderucci, Dean P.; Asher, Joseph M., Game account access device.
  260. Amaitis, Lee M.; Asher, Joseph M.; Bahrampour, Robert F.; Mylet, Darrin M.; Wilkins, Alan B.; Lutnick, Howard W., Gaming system with identity verification.
  261. Amaitis, Lee M.; Asher, Joseph M.; Bahrampour, Robert E.; Mylet, Darrin M.; Wilkins, Alan B.; Lutnick, Howard W., Gaming system with location determination.
  262. Short, Joel E.; Ewan, Ray S.; Sorcsek, Jerome, Gateway device having an XML interface and associated method.
  263. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  264. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  265. Hannel,Clifford L.; Lipstone,Laurence R.; Schneider,David S., Generalized policy server.
  266. Sposetti, Jeffrey Thomas; Greysman, Lev, Groupware portlets for integrating a portal with groupware systems.
  267. Scheuermann,Walter James, Hardware implementation of the secure hash standard.
  268. Scheuermann, W. James; Hogenauer, Eugene B., Hardware task manager.
  269. Scheuermann, W. James; Hogenauer, Eugene B., Hardware task manager.
  270. Scheuermann, W. James; Hogenauer, Eugene B., Hardware task manager.
  271. Scheuermann, W. James; Hogenauer, Eugene B., Hardware task manager.
  272. Ramanan, Venkata; Hunt, Simon, Herd based scan avoidance system in a network environment.
  273. Ramanan, Venkata; Hunt, Simon, Herd based scan avoidance system in a network environment.
  274. Chiles,David Clyde; Bosco,Eric, Home-networking.
  275. Chiles,David Clyde; Bosco,Eric, Home-networking.
  276. Hazlehurst, Peter Alexander; Alvarez, Cindy, Host exchange in bill paying services.
  277. Kallai, Christopher; Ericson, Michael Darrell Andrew; Lambourne, Robert A., Identification of playback device and stereo pair names.
  278. Millington, Nicholas A. J.; Hainsworth, Paul V., Indicator on a network device.
  279. Malcolm, Peter Bryan, Information management system.
  280. Malcolm, Peter Bryan, Information management system.
  281. Malcolm, Peter Bryan, Information management system.
  282. Malcolm, Peter Bryan, Information management system.
  283. Malcolm, Peter Bryan; Napier, John A.; Stickler, Andrew M.; Tamblin, Nathan J.; Beadle, Paul James O.; Crocker, Jason P., Information management system.
  284. Malcolm, Peter Bryan; Napier, John Anthony; Stickler, Andrew Mark; Tamblin, Natahan John; Beadle, Paul James Owen; Crocker, Jason Paul, Information management system.
  285. Malcolm, Peter Bryan; Napier, John Anthony; Stickler, Andrew Mark; Tamblin, Nathan John; Beadle, Paul James Owen; Crocker, Jason Paul, Information management system.
  286. Lim, Keng, Information management system with two or more interactive enforcement points.
  287. Yadav, Satyendra, Integrated network intrusion detection.
  288. Yadav, Satyendra, Integrated network intrusion detection.
  289. Horton, Noah; Singhal, Sandeep K., Integration of social network information and network firewalls.
  290. Izatt, David; Wilson, Billy Ray; Smith Cashion, Jackie; Hall, J. Chandler; Davidson, Donald J.; Langston, Russ, Intelligent firewall.
  291. Kallai, Christopher; Chamness, Mike; Ericson, Michael Darrell Andrew, Intelligently increasing the sound level of player.
  292. Kallai, Christopher; Chamness, Mike; Ericson, Michael Darrell Andrew, Intelligently modifying the gain parameter of a playback device.
  293. Kumar, Srihari; Desai, Satyen; Kelley, John; Hayward, Blake Earl; Scott, Jenny; Pandurangan, Senthil Kumar, Interactive activity interface for managing personal data and performing transactions over a data packet network.
  294. Malik, Dale W., Interactive management of storefront purchases.
  295. Lu, Daozheng; Harkness, David H.; Bhatia, Manish; Samson, Jerome; Feininger, William A., Interactive service device metering systems.
  296. Lu, Daozheng; Harkness, David H.; Bhatia, Manish; Samson, Jerome; Feininger, William A., Interactive service device metering systems.
  297. Lu, Daozheng; Harkness, David H.; Bhatia, Manish; Samson, Jerome; Feininger, William A., Interactive service device metering systems.
  298. Zhou, Xiaoming; Hoover, Roger; Shekyan, Sergey; Call, Justin, Intercepting and supervising calls to transformed operations and objects.
  299. Zhou, Xiaoming; Hoover, Roger; Shekyan, Sergey; Call, Justin, Intercepting and supervising, in a runtime environment, calls to one or more objects in a web page.
  300. Haitsuka,Stacy; Burr,Ronald; MacKenzie,Harold; Zebian,Marwan; Warren,Terry; Blaser,W. Shane; Giffen,Colin, Internet service error tracking.
  301. DeHaas, Ronald J.; Hammersley, Scott D.; Rose, Collin J., Internet use monitoring system and method.
  302. McArdle, Mark J.; Johnston, Brent A., Intrusion prevention for active networked applications.
  303. Desai, Mehul; Pitroda, Satyan G.; Maniar, Nehal, Isolating distinct service provider widgets within a wallet container.
  304. Rayes, Mark Ammar; Cheung, Michael; Droms, Ralph; Dini, Petre, Isolation approach for network users associated with elevated risk.
  305. Pitroda, Satyan G.; Desai, Mehul, Issuing an account to an electronic transaction device.
  306. Nagarajan, Sivakumar; Dikic, Srdan; McConnaughay, Mark A.; Bender, Christopher Lyle; Bozsitz, Marius, Key management on device for perimeters.
  307. Millington, Nicholas A. J.; Cullen, Tom; Reimann, Robert; Lehman, Brent, Leaving group and smart line-in processing.
  308. Spicer, Steven; Martin, Christopher; Pidduck, Patrick; Lehan, Tim; Pereira, Kathy, Limited-bandwidth electronic data communication system field of the invention.
  309. Owens, II,John Barclay; Meenan,Patrick, Local device access controls.
  310. Meenan,Patrick; Sengpiehl,Donald P.; Thornberg,Rich, Local proxy server for establishing device controls.
  311. Petersen, Chris; Villella, Phillip, Log collection, structuring and processing.
  312. Petersen, Chris; Villella, Phillip, Log collection, structuring and processing.
  313. Sambhwani, Sharad; Heidari, Ghobad, Low I/O bandwidth method and system for implementing detection and identification of scrambling codes.
  314. Sambhwani, Sharad; Heidari, Ghobad, Low I/O bandwidth method and system for implementing detection and identification of scrambling codes.
  315. Sambhwani,Sharad; Heidari,Ghobad, Low I/O bandwidth method and system for implementing detection and identification of scrambling codes.
  316. Foster, David; Bonsall, Russ; Caddel, Jeff; Dormann, William; Perryman, Laura; Peeke-Vout, John, Maintaining a secure computing device in a test taking environment.
  317. Foster, David; Bonsall, Russ; Caddell, Jeff; Dorman, William; Perryman, Laura; Peeke-Vout, John, Maintaining a secure computing device in a test taking environment.
  318. Kallai, Christopher; Ericson, Michael Darrell Andrew; Lambourne, Robert A., Making and indicating a stereo pair.
  319. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  320. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  321. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  322. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  323. Edery, Yigal Mordechai; Vered, Nirmrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  324. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  325. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  326. Schneider, Jerome L., Malware management through kernel detection during a boot sequence.
  327. Hartman, Robert Charles; Dietrich, II, John Elton; Finn, Jeffrey James; Holm, Rodney Dean, Managed services platform.
  328. Hartman, Robert Charles; Dietrich, II, John Elton; Finn, Jeffrey James; Holm, Rodney Dean, Managed services platform.
  329. Ho, Alan Pak-Lun; Mueller, Michael J.; Chin, Eugene, Managing application access to certificates and keys.
  330. Ho, Alan Pak-Lun; Mueller, Michael J.; Chin, Eugene, Managing application access to certificates and keys.
  331. Bender, Christopher Lyle; Cho, Jung Hyun; Foy, Jason Paul; Nagarajan, Sivakumar, Managing application execution and data access on a device.
  332. Bender, Christopher Lyle; Cho, Jung Hyun; Foy, Jason Paul; Nagarajan, Sivakumar, Managing application execution and data access on a device.
  333. Bowman-Amuah, Michel K., Managing information in an integrated development architecture framework.
  334. Umbreit, Timothy F., Managing internet pornography effectively.
  335. Schieman, Adam Richard; Major, Daniel Jonas; Goodman, Kevin; Nagarajan, Sivakumar, Managing permission settings applied to applications.
  336. Ryerson, Christopher Maybee; Bender, Christopher Lyle; Winkler, Michael Thomas; Bukurak, David; Altman, Benjamin, Managing use of network resources.
  337. Hodge, Stephen; Woody, David, Message exchange.
  338. Lu, Larry L., Message screening system.
  339. Lu, Larry L., Message screening system.
  340. Lu, Larry L., Message screening system utilizing supervisory screening and approval.
  341. Lu, Larry L., Message screening system utilizing supervisory screening and approval.
  342. Black, Robert Barth, Method and aparatus for presence based resource management.
  343. Millington, Nicholas A. J., Method and apparatus for adjusting volume in a synchrony group.
  344. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and apparatus for assigning access control levels in providing access to networked content files.
  345. Simmons, Timothy, Method and apparatus for associating tickets in a ticket hierarchy.
  346. Simmons, Timothy Ernest, Method and apparatus for associating tickets in a ticket hierarchy.
  347. Hammond, Nicolas J., Method and apparatus for auditing network security.
  348. Tse, Chi Chiu; Mazzuca, Elliott Michael Guy; Ho, Alan Pak-Lun, Method and apparatus for automatic VPN login on interface selection.
  349. Hoashi, Keiichirou; Inoue, Naomi; Hashimoto, Kazuo, Method and apparatus for automatic information filtering using URL hierarchical structure and automatic word weight learning.
  350. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for automatically deploying security components in a content distribution system.
  351. Rabbe Fogelholm SE; Johan Svedberg SE, Method and apparatus for avoiding IP-address collision when connecting an incoming voice phone call to an internet application.
  352. Yanovsky, Boris; Yanovsky, Roman, Method and apparatus for centralized policy programming and distributive policy enforcement.
  353. Yanovsky, Boris; Yanovsky, Roman, Method and apparatus for centralized policy programming and distributive policy enforcement.
  354. Bikram Singh Bakshi ; Michael Man-Hak Tso, Method and apparatus for detecting a user-controlled parameter from a client device behind a proxy.
  355. Armandpour, Tim; Malik, Masroor, Method and apparatus for detecting changes in websites and reporting results to web developers for navigation template repair purposes.
  356. William R. Cousins ; Franz Badias ; William S. Means, Method and apparatus for detecting changes to a collection of objects.
  357. Brown, Michael Kenneth; Bender, Christopher Lyle; Little, Herbert Anthony, Method and apparatus for differentiated access control.
  358. Brown, Michael Kenneth; Bender, Christopher Lyle; Little, Herbert Anthony, Method and apparatus for differentiated access control.
  359. Brown, Michael Kenneth; Bender, Christopher Lyle; Little, Herbert Anthony; Brown, Michael Stephen, Method and apparatus for differentiated access control.
  360. Millington, Nicholas A. J., Method and apparatus for dynamic master device switching in a synchrony group.
  361. Kay, James, Method and apparatus for electronic mail filtering.
  362. Kay, James, Method and apparatus for electronic mail filtering.
  363. Kay, James, Method and apparatus for electronic mail filtering.
  364. Hyndman, Arn; Sauriol, Nicholas, Method and apparatus for enabling enhanced control of traffic propagation through a network firewall.
  365. Yadav,Satyendra, Method and apparatus for enforcing network security policies.
  366. Schwartz, Elliot, Method and apparatus for firewall traversal.
  367. Schwartz, Elliot, Method and apparatus for firewall traversal.
  368. Dutta,Rabindranath, Method and apparatus for identifying universal resource locator rewriting in a distributed data processing system.
  369. Mason, John; Watson, Richard; Nikzad, Arman; Joseph, Eugene, Method and apparatus for implementing alerts on a browser running on a portable handheld device.
  370. Mason, John; Watson, Richard; Nikzad, Arman; Joseph, Eugene, Method and apparatus for implementing alerts on a browser running on a portable handheld device.
  371. Lerner, Jack Lawrence, Method and apparatus for integrating distributed shared services system.
  372. Lerner, Jack Lawrence, Method and apparatus for integrating distributed shared services system.
  373. Lerner, Jack Lawrence, Method and apparatus for integrating distributed shared services system.
  374. Lerner,Jack Lawrence, Method and apparatus for integrating distributed shared services system.
  375. Nagarajan, Sivakumar; Bender, Christopher Lyle; McConnaughay, Mark, Method and apparatus for management of multiple grouped resources on device.
  376. Arif, Tasleem; Kumar, Manoj; Avasthi, Prakhar; Dixit, Achintya; Govekar, Dhananjay; Das, Aleena; Khan, Munwar; Magarkar, Sanket; Shekhar, Shashank, Method and apparatus for managing application data usage.
  377. Manning, Michael; Burshan, Chen Yehezkel; Sowatskey, Nathan John; Kumar, Ritesh; Wilkins, Gregory John, Method and apparatus for managing proxy and non-proxy requests in a telecommunications network.
  378. Manning, Michael; Burshan, Chen Yehezkel; Sowatskey, Nathan John; Kumar, Ritesh; Wilkins, Gregory John, Method and apparatus for managing proxy and non-proxy requests in telecommunications network.
  379. Ide, Curtis E.; Brass, Philip C.; Doty, Theodore R., Method and apparatus for network assessment and authentication.
  380. Ide,Curtis E.; Brass,Philip C.; Doty,Theodore R., Method and apparatus for network assessment and authentication.
  381. Millington, Nicholas A. J., Method and apparatus for playback by a synchrony group.
  382. Whittaker,James A.; Chaturvedi,Rahul; Wagner,John R., Method and apparatus for preemptive monitoring of software binaries by instruction interception and dynamic recompilation.
  383. Black, Robert Barth, Method and apparatus for presence based resource management.
  384. Bhargava, Rishi; Vittal, Chiradeep; Saveram, Swaroop, Method and apparatus for process enforced configuration management.
  385. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  386. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  387. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  388. Braddy, Ricky Gene; Simmons, Timothy Ernest; Stone, David Sean, Method and apparatus for providing authorized remote access to application sessions.
  389. Braddy, Ricky Gene; Simmons, Timothy Ernest; Stone, David Sean, Method and apparatus for providing authorized remote access to application sessions.
  390. Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olsen, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  391. Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olsen, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  392. Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olson, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  393. Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olson, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  394. Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olson, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  395. Hanson, Aaron D.; Sturniolo, Emil; Menn, Anatoly; Olson, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  396. Hanson,Aaron D.; Sturniolo,Emil A.; Menn,Anatoly; Olson,Erik D.; Savarese,Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  397. Hanson,Aaron D.; Sturniolo,Emil A.; Menn,Anatoly; Olson,Erik D.; Savarese,Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  398. Sturniolo, Emil A.; Savarese, Joseph T.; Olson, Erik; Thompson, Dave; Jackson, Michael; Renouard, Julia, Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  399. Braddy, Ricky Gene; Simmons, Timothy Ernest; Calvin, Phillip N., Method and apparatus for providing policy-based document control.
  400. Sturniolo, Emil; Stavens, Aaron; Savarese, Joseph, Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments.
  401. Cooper, Geoffrey; Sherlock, Kieran G.; Hoy, Mark, Method and apparatus for rate limiting.
  402. Braddy, Ricky Gene; Simmons, Timothy Ernest, Method and apparatus for reducing disclosure of proprietary data in a networked environment.
  403. Lum, Clinton Edward, Method and apparatus for remote installation of network drivers and software.
  404. Lum,Clinton Edward, Method and apparatus for remote installation of network drivers and software.
  405. Tse, Chi Chiu; Mazzuca, Elliott Michael Guy; Hammel, Konrad, Method and apparatus for separation of connection data by perimeter type.
  406. Millington, Nicholas A. J., Method and apparatus for switching between a directly connected and a networked audio source.
  407. Bonnie J. Lowell, Method and apparatus for tracking network usage.
  408. Burshan, Chen Yehezkel; Manning, Michael; Goldberg, Elad, Method and apparatus for user domain based white lists.
  409. Larson, Gunnar; Fuks, Peter; Appelgren, Jorgen, Method and arrangement for automatically controlling access between a computer and a communication network.
  410. Summers Monty, Method and computer program for operating an interactive themed attraction accessible by computer users.
  411. Bates, Cary Lee; Cragun, Brian John; Day, Paul Reuben, Method and computer program product for implementing parental supervision for internet browsing.
  412. Shevchenko, Oleksiy Yu., Method and device for computer memory protection against unauthorized access.
  413. Vinati,Felice; Vinati,Samuele; Vinati,Matteo, Method and device for controlling the time which a user spends connected to a data communication network.
  414. Yamada, Kazuhiro; Yamamoto, Masaaki; Hiramatsu, Yoshiaki; Inoue, Kyoko; Ooseki, Eriko; Tokuda, Motoki; Ooi, Tatsuro; Sumi, Yutaka, Method and device for managing access to network.
  415. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K. R., Bharath; Kumar, Anil, Method and device for performing caching of dynamically generated objects in a data communication network.
  416. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K.R., Bharath; Kumar, Anil, Method and device for performing caching of dynamically generated objects in a data communication network.
  417. Khemani, Prakash; Sundarrajan, Prabakar; Kumar, Lakshmi; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravanakumar, Method and device for performing integrated caching in a data communication network.
  418. Swander, Brian D.; Dixon, William H., Method and framework for integrating a plurality of network policies.
  419. Swander,Brian D.; Dixon,William H., Method and framework for integrating a plurality of network policies.
  420. Naudus Stanley T., Method and protocol for synchronized transfer-window based firewall traversal.
  421. Master, Paul L., Method and system for achieving individualized protected space in an operating system.
  422. Rubin, Moshe; Matitya, Moshe; Melnick, Artem; Touboul, Shlomo; Yermakov, Alexander; Shaked, Amit, Method and system for adaptive rule-based content scanners.
  423. Rubin, Moshe; Matitya, Moshe; Melnick, Artem; Touboul, Shlomo; Yermakov, Alexander; Shaked, Amit, Method and system for adaptive rule-based content scanners for desktop computers.
  424. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  425. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  426. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  427. Sundaralingam, Sri Ganeshan; Patwardhan, Aniruddha, Method and system for classification of wireless devices in local area computer networks.
  428. Roscoe,Timothy; Lyles,Joseph B.; Isaacs,Rebecca, Method and system for communication control in a computing environment.
  429. Zobel, Robert David; Dodd, Timothy David; Millar, Sharon A.; Nesfeder, Jr., David Gerald; Singer, Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  430. Zobel,Robert David; Dodd,Timothy David; Millar,Sharon A.; Nesfeder, Jr.,David Gerald; Singer,Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  431. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of networked application client software by explicit human input.
  432. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  433. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  434. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  435. Hammer, John M.; Ge, Rixin; Burke, Charles D.; Hubbard, Charles, Method and system for creating a record for one or more computer security incidents.
  436. Master, Paul L., Method and system for creating and programming an adaptive computing engine.
  437. Chaskar,Hemant; Jonnalagadda,Murthy; Mittal,Sharad; Bhagwat,Pravin, Method and system for detecting wireless access devices operably coupled to computer local area networks and related methods.
  438. Rivera, Juan, Method and system for dynamically associating access rights with a resource.
  439. Rivera, Juan, Method and system for dynamically associating access rights with a resource.
  440. Medin, David T.; Poduska, Matthew J.; Jensen, Christopher M., Method and system for extending the functionality of an environmental monitor for an industrial personal computer.
  441. Kay, James, Method and system for filtering electronic messages.
  442. Dodd, Timothy D.; Mewett, Scott; Ide, Curtis E.; Overcash, Kevin A.; Dennerline, David A.; Williams, Bobby J.; Sells, Martin D., Method and system for identifying, fixing, and updating security vulnerabilities.
  443. Hackenberger, William Frank; Hendry, Randy Jay; Wood, Christopher James, Method and system for implementing security devices in a network.
  444. Bookstaff, Blake, Method and system for intelligent processing of electronic information with cloud computing.
  445. McVeigh, Ryan Sean; Roth, Steven Leslie; Patadia, Jalpesh; Saarva, Tanya; Zhou, Xiaojiang; Posner, Brad, Method and system for interacting with a virtual content repository.
  446. Yen, Hsiang Tsun; Weng, Chien Sen; Taylor, Luke, Method and system for interaction between a browser engine and an application.
  447. Kennis, Peter H., Method and system for intrusion detection in a computer network.
  448. Kimbrell, Jacob Warren, Method and system for locking an electronic device.
  449. Farley,Timothy P.; Hammer,John M.; Williams,Bryan Douglas; Brass,Philip Charles; Young,George C.; Mezack,Derek John, Method and system for managing computer security information.
  450. Plunkett, Robert T.; Heidari, Ghobad; Master, Paul L., Method and system for managing hardware resources to implement system functions using an adaptive computing architecture.
  451. Plunkett, Robert T.; Heidari, Ghobad; Master, Paul L., Method and system for managing hardware resources to implement system functions using an adaptive computing architecture.
  452. Plunkett, Robert T.; Heidari, Ghobad; Master, Paul L., Method and system for managing hardware resources to implement system functions using an adaptive computing architecture.
  453. Plunkett, Robert T.; Heidari, Ghobad; Master, Paul L., Method and system for managing hardware resources to implement system functions using an adaptive computing architecture.
  454. Bhagwat, Pravin; Chaskar, Hemant; King, David C.; Rawat, Jai, Method and system for monitoring a selected region of an airspace associated with local area networks of computing devices.
  455. Makhija, Dinesh, Method and system for monitoring flows in network traffic.
  456. Patwardhan, Aniruddha, Method and system for monitoring of wireless devices in local area computer networks.
  457. Hall, Gabriel J.; Ramaley, Alan, Method and system for packing and unpacking web pages.
  458. Hall,Gabriel J.; Ramaley,Alan, Method and system for packing and unpacking web pages.
  459. Kumar, Srinivas; Bettadapura, Vijayashree S., Method and system for policy simulation.
  460. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Method and system for protecting a computer and a network from hostile downloadables.
  461. Palmer, Jr., Bernard Paul; Graham, Robert David, Method and system for protecting computer networks by altering unwanted network data traffic.
  462. Mohinder, Preet, Method and system for providing user space address protection from writable memory area in a virtual environment.
  463. Scheuermann, W. James, Method and system for reconfigurable channel coding.
  464. Scheuermann, W. James, Method and system for reconfigurable channel coding.
  465. Scheuermann, W. James, Method and system for reconfigurable channel coding.
  466. Scheuermann, W. James, Method and system for reconfigurable channel coding.
  467. Walker Jeffrey H., Method and system for reducing the volume of audit data and normalizing the audit data received from heterogeneous sources.
  468. Wagner Richard H., Method and system for responding to hidden data and programs in a datastream.
  469. Shelest, Art; Field, Scott A.; Raghunathan, Subhashini, Method and system for separating rules of a security policy from detection criteria.
  470. Shelest, Art; Bahl, Pradeep; Field, Scott A., Method and system for troubleshooting when a program is adversely impacted by a security policy.
  471. Rao, Goutham; McCarthy, Lewis; Simmons, Timothy Ernest, Method and system for verification of an endpoint security scan.
  472. Rao, Goutham; McCarthy, Lewis; Simmons, Timothy Ernest, Method and system for verification of an endpoint security scan.
  473. Chatigny, Michelle; Rowe, Richard E., Method and system for verifying entitlement to play a game using a biometric identifier.
  474. Bhattacharya, Arup; Wu, John Jun, Method and system to enable controlled safe internet browsing.
  475. Kay, James, Method and systems for collecting addresses for remotely accessible information sources.
  476. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for routing packets from a gateway to an endpoint.
  477. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for routing packets from a gateway to an endpoint.
  478. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for securing remote access to private networks.
  479. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for securing remote access to private networks.
  480. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method for accessing a digital network by way of one or more Internet service providers.
  481. Vinati,Samuele; Vinati,Felice; Berardinelli,Ivan, Method for controlling access to a data communication network, with user identification.
  482. Devgan, Manish; McCauley, Rodney, Method for delegated administration.
  483. Griffin, Philip B.; Devgan, Manish; Toussaint, Alex; McCauley, Rod, Method for delegated administration.
  484. Tom, Allen Lee; Bethur, Mohan Kumar S.; Shin, Hyun Jong; Huang, Jun-Shong, Method for displaying web user's authentication status in a distributed single login network.
  485. Tom, Allen Lee; Bethur, Mohan Kumar S.; Shin, Hyun Jong; Huang, Jun-Shong, Method for displaying web user's authentication status in a distributed single login network.
  486. Tom,Allen Lee; Bethur,Mohan Kumar S.; Shin,Hyun Jong; Huang,Jun Shong, Method for displaying web user's authentication status in a distributed single login network.
  487. Bender, Christopher Lyle; Little, Herbert Anthony; Brown, Michael Kenneth; Brown, Michael Stephen, Method for establishing a plurality of modes of operation on a mobile device.
  488. Bender, Christopher Lyle; Little, Herbert Anthony; Brown, Michael Kenneth; Brown, Michael Stephen, Method for establishing a plurality of modes of operation on a mobile device.
  489. Izatt, David, Method for improving security of computer networks.
  490. Swander,Brian D., Method for indexing a plurality of policy filters.
  491. Krishna Asur Bharat ; Robert Chisolm Miller, Method for learning character patterns to interactively control the scope of a web crawler.
  492. Fertell, David A.; Field, Jr., Joseph I., Method for managing computer network access.
  493. Swander, Brian D.; Chhabra, Avnish Kumar; Mayfield, Paul G., Method for managing network filter based policies.
  494. Swander,Brian D.; Chhabra,Avnish Kumar; Mayfield,Paul G., Method for managing network filter based policies.
  495. Todd ; Sr. Robert E. ; Glahe Aaron C. ; Pendleton Adam H., Method for network self security assessment.
  496. Gmuender, John Everett; Selgas, Thomas Drennan; Massing, Michael Brian, Method for providing a network address.
  497. Griffin, Philip B.; Devgan, Manish; Toussaint, Alex; McCauley, Rod, Method for role and resource policy management optimization.
  498. Yona Hollander IL; Ophir Rachman IL; Oded Horovitz IL, Method for secure function execution by calling address validation.
  499. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method of accessing a selected network.
  500. Saraf, Suman; Agrawal, Sharad; Kumar, Pankaj, Method of and system for computer system denial-of-service protection.
  501. Bhargava, Rishi; Reese, Jr., David P., Method of and system for computer system state checks.
  502. Saraf, Suman; Agrawal, Sharad; Kumar, Pankaj, Method of and system for malicious software detection using critical address space protection.
  503. Saraf, Suman; Agrawal, Sharad; Srivastava, Vivek, Method of and system for reverse mapping vnode pointers.
  504. Morgan, Dennis; Gavrilescu, Alexandru; Burstein, Jonathan L.; Shelest, Art; LeBlanc, David, Method of assisting an application to traverse a firewall.
  505. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method of connecting a user to a network.
  506. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method of modifying a toolbar.
  507. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method of modifying a toolbar.
  508. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method of obtaining a network address.
  509. MacPhail, Margaret Gardner, Method to keep a persistent trace of weblink use per user.
  510. Subramaniam, Pavitra; Zoss, Jason; Ying, Jian-Jung; Caltabiano, Marc, Method, apparatus, and system for searching based on search visibility rules.
  511. Subramaniam,Pavitra; Zoss,Jason; Ying,Jian Jung; Caltabiano,Marc, Method, apparatus, and system for searching based on search visibility rules.
  512. Subramaniam,Pavitra; Zoss,Jason; Ying,Jian Jung; Caltabiano,Marc, Method, apparatus, and system for searching based on search visibility rules.
  513. Master,Paul L.; Hogenauer,Eugene; Wu,Bicheng William; Chuang,Dan MingLun; Freeman Benson,Bjorn, Method, system and program for developing and scheduling adaptive integrated circuity and corresponding control or configuration information.
  514. Novaes,Marcos N.; Laib,Gregory D.; Goering,Ronald T.; Lucash,Jeffrey S.; Sohos,George, Method, system and program products for ordering lists of service addresses to provide load balancing of a clustered environment.
  515. Cochran, Stephen Thomas; McNally, Michael R., Method, system, and program for executing operations on a client in a network environment.
  516. Wells, William R.; Mattice, Harold E.; Griswold, Chauncey W.; Wilder, Richard L., Methods and apparatus for limiting access to games using biometric data.
  517. Wells, William R.; Mattice, Harold E.; Griswold, Chauncey W.; Wilder, Richard L., Methods and apparatus for limiting access to games using biometric data.
  518. Donald, James Lawrence; Wright, David Howell, Methods and apparatus for metering computer-based media presentation.
  519. Karim, Ron, Methods and apparatus for permitting transactions across firewalls.
  520. Pedersen, Bradley, Methods and apparatus for providing access to persistent application sessions.
  521. Pedersen, Bradley J., Methods and apparatus for providing access to persistent application sessions.
  522. Ahmavaara, Kalle; Kadakia, Jatinkumar Chandrakant; Warlick, Michael Vernon, Methods and apparatus for providing or receiving data connectivity.
  523. Jones, Aaron C.; Havekost, Robert B., Methods and apparatus to identify a degradation of integrity of a process control system.
  524. Yuan, Eric; Sheppard, Matthew, Methods and apparatuses for accessing an application on a remote device.
  525. Nicodemus, Blair Gaver; Stephens, Billy Edison, Methods and systems for controlling access to computing resources based on known security vulnerabilities.
  526. Nicodemus, Blair; Stephens, Billy Edison, Methods and systems for controlling access to computing resources based on known security vulnerabilities.
  527. Nicodemus, Blair; Stephens, Billy Edison, Methods and systems for controlling access to computing resources based on known security vulnerabilities.
  528. Treder, Terry Noel; Fleck, Christopher; Marano, Adam; Roychoudhry, Anil; Mazzaferri, Richard James, Methods and systems for maintaining desktop environments providing integrated access to remote and local resources.
  529. Schepis, Adam; Boucher, Matt, Methods and systems for providing context for parental-control-policy violations.
  530. Thapliyal, Ashish V.; Mittal, Vishal; Spataro, Tony; Kennedy, John, Methods and systems for providing scalable authentication.
  531. Mazzaferri, Richard James, Methods and systems for providing, by a remote machine, access to a desk band associated with a resource executing on a local machine.
  532. Mazzaferri, Richard James, Methods and systems for providing, by a remote machine, access to a desk band associated with a resource executing on a local machine.
  533. Mazzaferri, Richard James, Methods and systems for providing, by a remote machine, access to a desk band associated with a resource executing on a local machine.
  534. Mazzaferri, Richard James, Methods and systems for providing, by a remote machine, access to functionality associated with a resource executing on a local machine.
  535. Mazzaferri, Richard James, Methods and systems for providing, by a remote machine, access to graphical data associated with a resource provided by a local machine.
  536. Mazzaferri, Richard James, Methods and systems for providing, by a remote machine, access to graphical data associated with a resource provided by a local machine.
  537. Hew, Chin; Kyaw, Thu Rein, Methods and systems for restricting electronic content access based on guardian control decisions.
  538. Morris, Nadia; Conner, William J., Methods of resetting passwords in network service systems including user redirection and related systems and computer program products.
  539. Morris, Scott; Conner, William, Methods of resetting passwords in network service systems including user redirection and related systems and computer-program products.
  540. Cox, David E.; Fletcher, James Corvin; Lindquist, David Bruce; Kessler, Carl S., Methods, systems and computer program products for policy based network control of characteristics of user sessions.
  541. Stolfo, Salvatore J.; Keromytis, Angelos D.; Bowen, Brian M.; Hershkop, Shlomo; Kemerlis, Vasileios P.; Prabhu, Pratap V.; Ben Salem, Malek, Methods, systems, and media for baiting inside attackers.
  542. Stolfo, Salvatore J.; Keromytis, Angelos D.; Bowen, Brian M.; Hershkop, Shlomo; Kemerlis, Vasileios P.; Prabhu, Pratap V.; Ben Salem, Malek, Methods, systems, and media for baiting inside attackers.
  543. Bowen, Brian M.; Prabhu, Pratap V.; Kemerlis, Vasileios P.; Sidiroglou, Stylianos; Stolfo, Salvatore J.; Keromytis, Angelos D., Methods, systems, and media for detecting covert malware.
  544. Bowen, Brian M.; Prabhu, Pratap V.; Kemerlis, Vasileios P.; Sidiroglou, Stylianos; Stolfo, Salvatore J.; Keromytis, Angelos D., Methods, systems, and media for detecting covert malware.
  545. Stolfo, Salvatore J.; Ben Salem, Malek; Hershkop, Shlomo, Methods, systems, and media for masquerade attack detection by monitoring computer user behavior.
  546. Stolfo, Salvatore J.; Salem, Malek Ben; Hershkop, Shlomo, Methods, systems, and media for masquerade attack detection by monitoring computer user behavior.
  547. Malik, Dale, Methods, systems, and products for ordering items.
  548. Malik, Dale, Methods, systems, and products for ordering items.
  549. Malik, Dale W., Methods, systems, and products for ordering items.
  550. Yang, Siying, Mitigating scripted attacks using dynamic polymorphism.
  551. Sturniolo, Emil A.; Savarese, Joseph T.; Olson, Erik; Patashnik, Eli, Mobile networking system and method using IPv4 and IPv6.
  552. Klein, John; Herrod, Allan, Mobile terminal with integrated host application software.
  553. Cooper, Gerald M., Modems that block data transfers during safe mode of operation and related methods.
  554. Kallai, Christopher; Ericson, Michael Darrell Andrew; Lambourne, Robert A.; Reimann, Robert; Triplett, Mark, Multi-channel pairing in a media system.
  555. Kallai, Christopher; Ericson, Michael Darrell Andrew; Lambourne, Robert A.; Reimann, Robert; Triplett, Mark, Multi-channel pairing in a media system.
  556. Swander,Brian D.; Pall,Gurdeep Singh; Rao,Nagampalli S. S. Narasimha, Multi-layer based method for implementing network firewalls.
  557. Swander,Brian D.; Mayfield,Paul G., Multi-layered firewall architecture.
  558. Amaitis, Lee; Williams, Paul; Tara, Sunny, Multi-process communication regarding gaming information.
  559. Amaitis, Lee; Williams, Paul; Tara, Sunny; Morrissette, Matthew, Multi-process communication regarding gaming information.
  560. Kuindersma, Michael; St. Laurent, Michael; Onischke, Mark, Multi-stage polling mechanism and system for the transmission and processing control of network resource data.
  561. Terzis, Andreas; Murgia, Marco A.; Baskaran, Ashwin, Multilayer access control security system.
  562. Allen, Nicholas A.; Batres, Stefan R.; Henning, II, Philbert L.; Lye, Margaret J.; Osovetsky, Evgeny, Multiplexed communication for duplex applications.
  563. Allen, Nicholas A.; Batres, Stefan R.; Henning, II, Philbert L.; Lye, Margaret J.; Osovetsky, Evgeny, Multiplexed communication for duplex applications.
  564. Roy, Paul; Al-Azzawe, Khalid; Carter, Cale; Chitnis, Ambarish; Hawes, Richard Masao, Network access control based on program state.
  565. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Payne, John; Nakawatase, Ryan Tadashi; Walpole, Thomas Paul; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste, Network audit and policy assurance system.
  566. North, Jr.,Paul R., Network communications analysis.
  567. Vahalia Uresh K ; Gupta Uday ; John Aju ; Ting Dennis P. J. ; Tzelnic Percy, Network file server having a message collector queue for connection and connectionless oriented protocols.
  568. Reeves, Randall E., Network protocol analyzer apparatus and method.
  569. Spicer,Steven; Martin,Christopher; Kuhl,Larry; Hollander,Brian; Pidduck,Patrick; Coutts,Steven; Von Hatten,Philip; Onischke,Mark; Grassick,Clayton; Lehan,Tim, Network resource access system.
  570. Spicer,Steven; Martin,Christopher; Kuhl,Larry; Hollander,Brian; Pidduck,Patrick; Coutts,Steven; Von Hatten,Philip; Onischke,Mark; Grassick,Clayton; Lehan,Tim, Network resource control system.
  571. Spicer,Steven; Martin,Christopher; Kuhl,Larry; Hollander,Brian; Pidduck,Patrick; Coutts,Steven; Von Hatten,Philip; Onischke,Mark; Grassick,Clayton; Lehan,Tim, Network resource control system.
  572. Maida Smith,Kathy; Engle,Steven W., Network security data management system and method.
  573. Parker,Benjamin J.; Werner,Shane W.; Diaz,Charles; Frederick,Terry M., Network security services architecture.
  574. Keanini, Timothy D.; Quiroga, Martin A.; Buchanan, Brian W.; Flowers, John S., Network security system having a device profiler communicatively coupled to a traffic monitor.
  575. Keanini,Timothy D.; Quiroga,Martin A.; Buchanan,Brian W.; Flowers,John S., Network security system having a device profiler communicatively coupled to a traffic monitor.
  576. Michael J. Wallent ; Rajeev Dujari ; Anand Ramakrishna ; Loren M. Kohnfelder ; Lewis Geer, Network security zones.
  577. Warrier,Ulhas S.; Iyer,Prakash, Network session management.
  578. Fujita Naoyuki,JPX, Network unauthorized access analysis method, network unauthorized access analysis apparatus utilizing the method, and computer-readable recording medium having network unauthorized access analysis pr.
  579. William J. Raduchel ; Abhay Gupta ; Yvonne Wilson, Network-based authentication of computer user.
  580. Wu, Jonathan; Rajan, Sreeranga P., Network-based bookmark management and web-summary system.
  581. Tarquini, Richard Paul; Schertz, Richard Louis, Node, method and computer readable medium for optimizing performance of signature rule matching in a network.
  582. Millington, Nicholas A. J., Obtaining and transmitting audio.
  583. Millington, Nicholas A. J., Obtaining content based on control by multiple controllers.
  584. Millington, Nicholas A. J., Obtaining content based on control by multiple controllers.
  585. Millington, Nicholas A. J., Obtaining content from direct source and other source.
  586. Millington, Nicholas A. J., Obtaining content from direct source and remote source.
  587. Millington, Nicholas A. J., Obtaining content from local and remote sources for playback.
  588. Millington, Nicholas A. J., Obtaining content from local and remote sources for playback.
  589. Millington, Nicholas A. J., Obtaining content from multiple remote sources for playback.
  590. Millington, Nicholas A. J., Obtaining content from multiple remote sources for playback.
  591. Millington, Nicholas A.J., Obtaining content from remote source for playback.
  592. Millington, Nicholas A.J., Obtaining content from remote source for playback.
  593. Jackson, David B., On-demand access to compute resources.
  594. Jackson, David B., On-demand compute environment.
  595. Jackson, David Brian, On-demand compute environment.
  596. Jackson, David Brian, On-demand compute environment.
  597. Christensen, Anders Bent; Jensen, Søren Eschricht, Open platform surveillance/monitoring system and method.
  598. Perryman, Laura; Walton, Eric; Logan, David; Collins, Michael, Optimized data stream upload.
  599. Perryman, Laura; Walton, Eric; Logan, David; Collins, Michael, Optimized data stream upload.
  600. Perryman, Laura; Walton, Eric; Logan, David; Collins, Michael, Optimized data stream upload.
  601. Thomas Christopher N. ; Jackowski Steven J. ; Brock Keven J., Ordering of multiple plugin applications using extensible layered service provider with network traffic filtering.
  602. Komisky,Dennie, Packet filtering methods and systems.
  603. Komisky, Dennis, Packet filtering system and methods.
  604. Kallai, Christopher; Ericson, Michael Darrell Andrew; Lambourne, Robert A., Pair volume control.
  605. Logan, David; Walton, Eric; Collins, Michael, Peered proctoring.
  606. Logan, David; Walton, Eric; Collins, Michael, Peered proctoring.
  607. Logan, David; Walton, Eric; Collins, Michael, Peered proctoring.
  608. Logan, David; Walton, Eric; Collins, Michael, Peered proctoring.
  609. Yuzhakov, Alexey, Permanent website hosting on mobile devices.
  610. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Persistent and reliable session securely traversing network components using an encapsulating protocol.
  611. Sebes, E. John; Bhargava, Rishi; Naik, Dilip, Piracy prevention using unique module translation.
  612. Millington, Nicholas A. J., Playback device.
  613. Millington, Nicholas A. J., Playback device.
  614. Millington, Nicholas A. J., Playback device.
  615. Millington, Nicholas A. J., Playback device.
  616. Millington, Nicholas A. J.; Hainsworth, Paul V., Playback device connection.
  617. Millington, Nicholas A. J., Playback device operating states.
  618. Kallai, Christopher; Ericson, Michael Darrell Andrew; Lambourne, Robert A.; Reimann, Robert; Triplett, Mark, Playback device pairing.
  619. Millington, Nicholas A. J., Playback device synchrony group states.
  620. Beadles,Mark A.; Emerick,William S.; Russo,Kevin A.; Mulh,Kenneth E.; Bell,Raymond J., Policy engine for modular generation of policy for a flat, per-device database.
  621. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Policy inheritance through nested groups.
  622. Erb, Jeremy, Policy service logging using graph structures.
  623. Yang, Siying, Polymorphic security policy action.
  624. Holmgren, Steve F.; MacFarlane, John L., Power decrease and increase based on packet type.
  625. Holmgren, Steve F.; MacFarlane, John L., Power decrease based on packet type.
  626. Holmgren, Steve F.; MacFarlane, John L., Power increase based on packet type.
  627. Holmgren, Steve F.; MacFarlane, John L., Power increase based on packet type.
  628. Ferguson, Geordon Thomas; Bender, Christopher Lyle; Zubiri, Alberto Daniel; Schneider, Kenneth Cyril; Whitehouse, Oliver; Hobbs, Christopher William Lewis, Presenting metadata from multiple perimeters.
  629. Ferguson, Geordon Thomas; Bender, Christopher Lyle; Zubiri, Alberto; Schneider, Kenneth Cyril; Whitehouse, Oliver; Hobbs, Christopher William Lewis, Presenting metadata from multiple perimeters.
  630. Adams, Neil Patrick; Little, Herbert Anthony, Privilege management and revocation.
  631. Dorman, William, Proctored performance analysis.
  632. Master, Paul L., Profiling of software and circuit designs utilizing data operation analyses.
  633. Bhargava, Rishi; Sebes, E. John, Program-based authorization.
  634. Wang, Jiahe Helen; Fan, Xiaofeng; Jackson, Collin Edward; Howell, Jonathan Ryan; Xu, Zhenbin, Protection and communication abstractions for web browsers.
  635. Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Protection of data accessible by a mobile device.
  636. Moloian, Armen; Ritchey, Ronald W., Quality assurance checks of access rights in a computing system.
  637. Moloian, Armen; Ritchey, Ronald W., Quality assurance checks of access rights in a computing system.
  638. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  639. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  640. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  641. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  642. Khan, Ayub S.; Nguyen, Nam T.; Liu, Peter T.; Narayanan, Srividhya, REST application exploration.
  643. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  644. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  645. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  646. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  647. Moloian, Armen; Ritchey, Ronald W., Reconciliation of access rights in a computing system.
  648. Moloian, Armen; Ritchey, Ronald W., Reconciliation of access rights in a computing system.
  649. Moloian, Armen; Ritchey, Ronald W., Reconciliation of access rights in a computing system.
  650. Montenegro Gabriel, Remote access firewall traversal URL.
  651. Chebolu, Anil Kumar; Hill, Timothy A.; McMenamin, Marie Louiise; Patrawala, Zakir S.; Virani, Samira S., Remote administration of computer access settings.
  652. Lenz,Norbert; Mielke,Frank; Thelen,Ralf, Request scheduler for automated software configuration.
  653. Jackson, David B., Reserving resources in an on-demand compute environment from a local compute environment.
  654. DeLuca, Michael Joseph, Resetting inactivity timer on computing device.
  655. Nash, Alistair, Resource access filtering system and database structure for use therewith.
  656. Millington, Nicholas A. J., Resuming synchronous playback of content.
  657. Millington, Nicholas A. J., Resuming synchronous playback of content.
  658. Millington, Nicholas A. J., Resuming synchronous playback of content.
  659. Millington, Nicholas A. J, Resynchronization of playback devices.
  660. Lin Chihuan Michael ; Mitkowski John R., Routing mechanism for networks with separate upstream and downstream traffic.
  661. Cole, Jonathan M.; Janczuk, Tomasz; Allen, Nicholas A.; Georgiev, Yavor, Routing requests for duplex applications.
  662. Porter, Brandon William; Bailes, Robert Stanley; Fernandes, Aaron Ben; McInerny, Michael James; Parakh, Vishal; Ramalingam, Harsha; Tamilmani, Karthik, Rule evaluation based on precomputed results.
  663. Franco, Roberto A.; Ganjam, Anantha P; Bedworth, John G.; Brundrett, Peter T.; Tokumi, Roland K, Running internet applications with low rights.
  664. Tokashiki, Mamoru, Schema-based link processing.
  665. Isaacs, Scott; Yolleck, Stephen Mark; Logan, Ronald Keith, Secure and extensible policy-driven application platform.
  666. Desai, Mehul; Pitroda, Satyan G.; Maniar, Nehal, Secure ecosystem infrastructure enabling multiple types of electronic wallets in an ecosystem of issuers, service providers, and acquires of instruments.
  667. Chirra, Radhika; Hegde, Nikhil; Knight, Richard J.; Narasimhan, Rashmi, Secure firewall rule formulation.
  668. Lau, Terence Chun-Yat; Mirlas, Lev, Secure flexible electronic submission acceptance system.
  669. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay, Secure traversal of network components.
  670. Flenley John Martin,GBX, Secure variable storage for internet applications.
  671. Pitroda, Satyan G.; Desai, Mehul, Securing a driver license service electronic transaction via a three-dimensional electronic transaction authentication protocol.
  672. Whitmer,Ray; Dhurvasula,Harish, Securing resources from untrusted scripts behind firewalls.
  673. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Security control module.
  674. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Security provider development model.
  675. Banzhof,Carl E.; Davies,John, Security risk analysis system and method.
  676. Teixeira, Steven L.; Carr, Christopher, Security system and methodology for providing indirect access control.
  677. Herrmann, Conrad K., Security system providing methodology for cooperative enforcement of security policies during SSL sessions.
  678. Bentley,Joseph, Security system with methodology for computing unique security signature for executable file employed across different machines.
  679. Linetsky, Gene, Security system with methodology for defending against security breaches of peripheral devices.
  680. Freund, Gregor P., Security system with methodology for interprocess communication control.
  681. Freund, Gregor Paul, Security system with methodology providing verified secured individual end points.
  682. Desai, Mehul; Pitroda, Satyan G.; Maniar, Nehal, Selecting ecosystem features for inclusion in operational tiers of a multi-domain ecosystem platform for secure personalized transactions.
  683. Beadles, Mark A.; Emerick, William S.; Russo, Kevin A.; Mulh, Kenneth E.; Bell, Raymond J., Selection and storage of policies in network management.
  684. Beadles, Mark A.; Emerick, William S.; Russo, Kevin A.; Mulh, Kenneth E.; Bell, Raymond J., Selection and storage of policies in network management.
  685. Beadles,Mark A.; Emerick,William S.; Russo,Kevin A.; Mulh,Kenneth E.; Bell,Raymond J., Selection and storage of policies in network management.
  686. Mann, Dwayne R.; Heard, Robert W.; Burchett, Christopher D.; Gordon, Ian R., Server, computer memory, and method to support security policy maintenance and distribution.
  687. Wolfe, Mark A., Server-side suggestion of preload operations.
  688. Desai, Mehul; Pitroda, Satyan G.; Maniar, Nehal, Shareable widget interface to mobile wallet functions.
  689. Jackson, David Brian, Simple integration of an on-demand compute environment.
  690. Jackson, David B., Simple integration of on-demand compute environment.
  691. Jackson, David Brian, Simple integration of on-demand compute environment.
  692. Hyatt, David; Guha, Ramanathan, Smart browsing providers.
  693. Hyatt,David; Guha,Ramanathan, Smart browsing providers.
  694. Millington, Nicholas A. J; Cullen, Tom; Reimann, Robert; Lehman, Brent, Smart line-in processing in a group.
  695. Millington, Nicholas A. J; Cullen, Tom; Reimann, Robert; Lehman, Brent, Smart-line in processing.
  696. Sebes, E. John; Vaishnav, Jay, Software modification by group to minimize breakage.
  697. Pandya, Suketu J.; Lakshmanan, Hariharan, Software, systems and methods for managing a distributed network.
  698. Pandya,Suketu J.; Joshi,Varad V., Software, systems and methods for managing a distributed network.
  699. Sebes, E. John, Solidifying the executable software set of a computer.
  700. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Source reputation information system with blocking of TCP connections from sources of electronic messages.
  701. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Source reputation information system with router-level filtering of electronic messages.
  702. Tommy Alcendor ; Zygmunt A. Lozinskie GB; Baiju D. Mandalia, Speaker verification for authorizing updates to user subscription service received by internet service provider (ISP) using an intelligent peripheral (IP) in an advanced intelligent network (AIN).
  703. Master,Paul L.; Watson,John, Storage and delivery of device features.
  704. Burns, Mark; St. Laurent, Michael; Krishnammagaru, Dharmesh, Streamlined system for the transmission of network resource data.
  705. Schuler, John A., Supervised access computer network router.
  706. Lu, Larry L.; O' Laughlen, Eric; Crowley, John, Supervising user interaction with online services.
  707. Lu, Larry L.; O'Laughlen, Eric; Crowley, John, Supervising user interaction with online services.
  708. Millington, Nicholas A. J., Switching between a directly connected and a networked audio source.
  709. Millington, Nicholas A. J.; Ericson, Michael, Synchronizing operations among a plurality of independently clocked digital data processing devices.
  710. Griffin,Philip B., System and method for XML data representation of portlets.
  711. Lucovsky, Jeffrey A., System and method for a process attribute based computer network filter.
  712. Sesma,Charles, System and method for accessing ActiveX objects in a platform dependent environment from objects in a platform independent environment.
  713. Sesma,Charles, System and method for accessing objects in a platform dependent environment from a platform independent environment.
  714. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  715. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  716. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  717. Kester,Harold; Ruskin,Dan; Lee,Chris; Anderson,Mark, System and method for adapting an internet filter.
  718. Moriconi,Mark S.; Godik,Simon; Xu,Mingde; Yagen,Ken, System and method for analyzing security policies in a distributed computer network.
  719. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J.; Mesdaq, Ali A., System and method for analyzing web content.
  720. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A., System and method for analyzing web content.
  721. Baddour, Victor L; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A, System and method for analyzing web content.
  722. Jolley,Chris; Giridhar,Sathyanarayana; Griffin,Philip B.; Howes,Jason; O'Neil,Edward K.; Patadia,Jalpesh, System and method for application flow integration in a portal framework.
  723. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Payne, John; Ritter, Stephen J.; Nakawatase, Ryan Tadashi; Pelly, John; Rutherford, M. Celeste, System and method for applying a machine-processable policy rule to information gathered about a network.
  724. Pagan, Florence C. I.; Short, Joel E., System and method for authorizing a portable communication device.
  725. Freishtat, Gregg; Rajan, Palaniswamy, System and method for automated electronic notification and transaction execution.
  726. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste; Payne, John, System and method for automated policy audit and remediation management.
  727. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste; Payne, John, System and method for automated policy audit and remediation management.
  728. Ellis,Danny Dee; Gallagher,Jeffrey William; Kaewlium,Anantrachai; Westerman,Matthew George; Proft,Richard Paul; Bush,Craig Mason, System and method for building a distributed internet application.
  729. Jensen,Christopher M.; Medin,David T.; Poduska,Matthew J., System and method for caching web pages on a management appliance for personal computers.
  730. Bhargava, Rishi; Reese, Jr., David P., System and method for clustering host inventories.
  731. Bhargava, Rishi; Reese, Jr., David P., System and method for clustering host inventories.
  732. Wolfe, Mark A., System and method for communicating information relating to a network resource.
  733. Wolfe,Mark A., System and method for communicating information relating to a network resource.
  734. Seeber,Ren챕, System and method for compiling images from a database and comparing the compiled images with known images.
  735. Seeber,Ren��, System and method for compiling images from a database and comparing the compiled images with known images.
  736. Remer, Eric B.; King, David A.; Remer, David L., System and method for connecting to a device on a protected network.
  737. Donahue,David B., System and method for content filtering using static source routes.
  738. McCauley,Rodney; Owen,James; Bales,Christopher E., System and method for content lifecycles in a virtual content repository that integrates a plurality of content repositories.
  739. McCauley,Rodney; Owen,James; Patadia,Jalpesh; Posner,Brad; Toussaint,Alexander, System and method for controlling access to anode in a virtual content repository that integrates a plurality of content repositories.
  740. Richard R. Viets ; David G. Motes ; Paula Budig Greve ; Wayne W. Herberg, System and method for controlling access to documents stored on an internal network.
  741. Viets, Richard R.; Motes, David G.; Greve, Paula Budig; Herberg, Wayne W., System and method for controlling access to documents stored on an internal network.
  742. Viets, Richard R.; Motes, David G.; Greve, Paula Budig; Herberg, Wayne W., System and method for controlling access to documents stored on an internal network.
  743. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  744. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  745. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  746. Amaitis, Lee M.; Asher, Joseph M.; Lutnick, Howard W.; Mylet, Darrin M.; Wilkins, Alan B., System and method for convenience gaming.
  747. Amaitis, Lee M.; Asher, Joseph M.; Lutnick, Howard W.; Mylet, Darrin M.; Wilkins, Alan B., System and method for convenience gaming.
  748. Bhattacharjee, Rajbir; Munjal, Nitin; Singh, Balbir; Singh, Pankaj, System and method for critical address space protection in a hypervisor environment.
  749. Schmid,Matthew N.; Bloch,John Thomas; Hill,Frank F.; Ghosh,Anup K., System and method for defending against malicious software.
  750. Freishtat, Gregg; Rajan, Palaniswamy, System and method for determining revenue from an intermediary derived from servicing data requests.
  751. Smithline,Neil; Giridhar,Sathyanarayana, System and method for determining the functionality of a software application based on nodes within the software application and transitions between the nodes.
  752. Rajan, Palaniswamy; Freishtat, Gregg, System and method for distributed storage and retrieval of personal information.
  753. Heard, Robert W.; Mann, Dwayne R.; Burchett, Christopher D.; Gordon, Ian R., System and method for distribution of security policies for mobile devices.
  754. Hubbard, Daniel Lyle; Ruskin, Dan, System and method for dynamic and real-time categorization of webpages.
  755. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  756. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  757. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  758. Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
  759. Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
  760. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  761. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  762. Beachem, Brent; Boucher, Peter; Nault, Gabe; Rollins, Richard; Wood, Jonathan Brett; Wright, Michael, System and method for filtering access points presented to a user and locking onto an access point.
  763. Lund, Peter K.; Petry, Scott M.; Titus, Jason H., System and method for filtering electronic messages using business heuristics.
  764. Lung, Peter K.; Petry, Scott M.; Titus, Jason H., System and method for filtering electronic messages using business heuristics.
  765. Adams, Neil Patrick; Little, Herbert Anthony; Kirkup, Michael Grant, System and method for handling data transfers.
  766. Little, Herbert Anthony; Adams, Neil Patrick; Kirkup, Michael Grant, System and method for handling data transfers.
  767. Thomas,Steve; Greene,Michael P.; Stowers,Bradley D., System and method for heuristic analysis to identify pestware.
  768. Griffin, Philip B.; Devgan, Manish; Toussaint, Alex; McCauley, Rod, System and method for hierarchical role-based entitlements.
  769. Griffin, Philip B.; Devgan, Manish; Toussaint, Alex; McCauley, Rod, System and method for hierarchical role-based entitlements.
  770. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for host-initiated firewall discovery in a network environment.
  771. Smith,Gregory L., System and method for identifying, classifying, extracting and resolving hidden entities.
  772. Moriconi,Mark S.; Godik,Simon; Xu,Mingde; Yagen,Ken, System and method for incrementally distributing a security policy in a computer network.
  773. Kumar, Srinivas; Weber, Dean A., System and method for inferring access policies from access event records.
  774. McCauley,Rodney; Owen,James; Patadia,Jalpesh; Posner,Brad; Toussaint,Alexander, System and method for information lifecycle workflow integration.
  775. Wolfe,Mark A., System and method for information retrieval employing a preloading procedure.
  776. Temoshenko,Leo; Nhan,Hugh; Parker,Charles M.; King,Robert L.; Douglas,Jonathan D.; Mitchell,Nathan A.; Everhart,George R.; Currie,Douglas W., System and method for intercepting packets in a pipeline network processor.
  777. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpoie, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  778. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpole, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  779. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpole, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  780. Cooper, Geoffrey Howard; Diehl, David Frederick; Ma, Robert, System and method for interlocking a host and a gateway.
  781. Cooper, Geoffrey Howard; Diehl, David Frederick; Ma, Robert, System and method for interlocking a host and a gateway.
  782. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  783. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  784. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  785. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  786. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  787. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  788. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  789. McVeigh,Ryan Sean; Roth,Steven Leslie; Patadia,Jalpesh; Saarva,Tanya; Zhou,Xiaojiang; Posner,Brad, System and method for lightweight loading for managing content.
  790. Bhargava, Rishi; Reese, Jr., David P., System and method for local protection against malicious software.
  791. Bhargava, Rishi; Reese, Jr., David P., System and method for local protection against malicious software.
  792. Moriconi, Mark S., System and method for maintaining security in a distributed computer network.
  793. Moriconi,Mark; Qian,Shelly, System and method for maintaining security in a distributed computer network.
  794. Moriconi,Mark; Qian,Shelly, System and method for maintaining security in a distributed computer network.
  795. Tilton,Earl W.; Morehead,Mark K.; Parent,Robert M.; Beane,Tommy L., System and method for managing access to active devices operably connected to a data network.
  796. Campbell Rene L. ; Jensen Morten S. ; Jones Kent H. ; Mauro Richard L. ; O'Reilly John P. ; McAbee-Reher Raphael D. ; Rau Dean D., System and method for managing computer and phone network resources.
  797. Von Hatten, Philip; Pidduck, Patrick; Evers, Rob; Kavanaugh, Frank; Sobiski, Mike; Hollander, Brian; Zhou, Mei; Turner, Justin; Onischke, Mark; Kuindersma, Michael; Krishnammagaru, Dharmesh; St. Laurent, Michael, System and method for managing printer resources on an internal network.
  798. Sawhney, Harvinder Singh; Saraf, Suman; Sharma, Rosen, System and method for managing virtual machine configurations.
  799. Laslo Olah ; Ferenc Friedler ; Zoltan Kovacs HU, System and method for monitoring computer usage.
  800. Bunch, Clinton D., System and method for monitoring the internet access of a computer.
  801. Bhargava, Rishi; Reese, Jr., David P., System and method for network level protection against malicious software.
  802. Bhargava, Rishi; Reese, Jr., David P., System and method for network level protection against malicious software.
  803. Yanovsky,Boris, System and method for network virus protection.
  804. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  805. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  806. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  807. Keir, Robin M.; Ecker, Stephen A., System and method for network vulnerability detection and reporting.
  808. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  809. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  810. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  811. Chen, Iue-Shuenn I.; Schoner, Brian F., System and method for partitioning multiple logical memory regions with access control by a central control agent.
  812. Bhargava, Rishi; Reese, Jr., David P., System and method for passive threat detection using virtual memory inspection.
  813. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan KR, Bharath; Kumar, Anil, System and method for performing flash caching of dynamically generated objects in a data communication network.
  814. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; K.R., Bharat Bhushan; Kumar, Anil, System and method for performing flash caching of dynamically generated objects in a data communication network.
  815. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bushan K. R., Bharath; Kumar, Anil, System and method for performing flash crowd caching of dynamically generated objects in a data communication network.
  816. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan KR, Bharath; Kumar, Anil, System and method for performing granular invalidation of cached dynamically generated objects in a data communication network.
  817. Haut,John; Griffin,Philip B.; Patadia,Jalpesh; Willcox,Steven; Breeden,Timothy, System and method for portal page layout.
  818. Agarwal, Sonali; Tarbotton, Lee Codel Lawson, System and method for preventing data loss using virtual machine wrapped applications.
  819. Graham,Robert David; Kavaler,Peter, System and method for preventing network misuse.
  820. Adams, Neil Patrick; Little, Herbert Anthony, System and method for privilege management and revocation.
  821. McVeigh, Ryan Sean; Roth, Steven Leslie; Patadia, Jalpesh; Saarva, Tanya; Zhou, Xiaojiang; Posner, Brad, System and method for providing SPI extensions for content management system.
  822. McCauley,Rodney; Owen,James; Bales,Christopher E., System and method for providing a lifecycle for information in a virtual content repository.
  823. Rosko, Robert; Gudipati, Jayashree, System and method for providing customers with seamless entry to a remote server.
  824. Rosko, Robert; Gudipati, Jayashree, System and method for providing customers with seamless entry to a remote server.
  825. Rosko,Robert; Ampani,Kumar, System and method for providing customers with seamless entry to a remote server.
  826. Roach, Perry J., System and method for providing customized response messages based on requested website.
  827. McCauley,Rodney; Owen,James; Patadia,Jalpesh; Posner,Brad; Toussaint,Alexander, System and method for providing lifecycles for custom content in a virtual content repository.
  828. McVeigh, Ryan Sean; Roth, Steven L.; Patadia, Jalpesh; Saarva, Tanya; Zhou, Xiaojiang; Posner, Brad, System and method for providing nested types for content management.
  829. Hall, Ian G.; Brietzke, Michael B.; Kakarla, Janardhan, System and method for providing silent sign on across distributed applications.
  830. Hall, Ian G.; Brietzke, Michael B.; Kakarla, Janardhan, System and method for providing silent sign on across distributed applications.
  831. Amaitis, Lee M.; Asher, Joseph M.; Bahrampour, Robert F.; Mylet, Darrin M.; Wilkins, Alan B.; Lutnick, Howard W., System and method for providing wireless gaming as a service application.
  832. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  833. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  834. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  835. St. Laurent, Michael; Onischke, Mark; Kuindersma, Michael; Krishnammagaru, Dharmesh; Stairs, Jonathon; Noreikis, Ken, System and method for releasing print jobs based on location information.
  836. Griffin,Philip B.; Devgan,Manish; Howes,Jason; Dunbar,Scott, System and method for rule-based entitlements.
  837. Kaib, Paul; Freishtat, Gregg, System and method for scheduling harvesting of personal information.
  838. McCauley, Rodney; Owen, James; Bales, Christopher E., System and method for schema lifecycles in a virtual content repository that integrates a plurality of content repositories.
  839. Owen, Russell N.; Little, Herbert A.; Yach, David P.; Shenfield, Michael, System and method for secure control of resources of wireless mobile communication devices.
  840. Owen, Russell N.; Little, Herbert A.; Yach, David P.; Shenfield, Michael, System and method for secure control of resources of wireless mobile communication devices.
  841. Owen, Russell N.; Little, Herbert A.; Yach, David P.; Shenfield, Michael, System and method for secure control of resources of wireless mobile communication devices.
  842. Owen, Russell N.; Little, Herbert A.; Yach, David P.; Shenfield, Michael, System and method for secure control of resources of wireless mobile communication devices.
  843. Owen, Russell Norman; Little, Herbert Anthony; Yach, David Paul; Shenfield, Michael, System and method for secure control of resources of wireless mobile communication devices.
  844. Owen, Russell Norman; Little, Herbert Anthony; Yach, David Paul; Shenfield, Michael, System and method for secure control of resources of wireless mobile communication devices.
  845. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Pelly, John; Nakawatase, Ryan Tadashi; Walpole, Thomas Paul, System and method for security information normalization.
  846. Bhargava, Rishi; Reese, Jr., David P., System and method for selectively grouping and managing program files.
  847. Patrick,Paul, System and method for server security and entitlement processing.
  848. Joseph,Jonathan L.; Huntington,Keith J.; Flynn,Rex A., System and method for the delivery, retrieval and display of content prior to operating system loading.
  849. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  850. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  851. Bunch, Clinton D., System and method for user behavioral management in a computing environment.
  852. Kumar, Srinivas; Bettadapura, Vijayashree S., System and method for using variable security tag location in network communications.
  853. McCauley,Rodney; Owen,James; Bales,Christopher E., System and method for viewing a virtual content repository.
  854. Broadhurst Christopher John Creighton,GBX ; Byrne Barry Anthony,GBX ; White Clive John,GBX ; Press James,GBX ; McMahon Piers,GBX, System and method for web server user authentication.
  855. Smith,Greg; Olander,Daryl B.; Stamm,Tom; Bergman,Robert; Cook,Thomas A., System and method for web-based personalization and ecommerce management.
  856. Amaitis, Lee M.; Asher, Joseph M.; Bahrampour, Robert F.; Mylet, Darrin M.; Wilkins, Alan B.; Lutnick, Howard W., System and method for wireless gaming system with alerts.
  857. Amaitis, Lee M.; Asher, Joseph M.; Bahrampour, Robert F.; Mylet, Darrin M.; Wilkins, Alan B.; Lutnick, Howard W., System and method for wireless gaming system with user profiles.
  858. Amaitis, Lee M.; Asher, Joseph M.; Bahrampour, Robert F.; Mylet, Darrin M.; Wilkins, Alan B.; Lutnick, Howard W., System and method for wireless gaming with location determination.
  859. Amaitis, Lee M.; Asher, Joseph M.; Bahrampour, Robert F.; Mylet, Darrin M.; Wilkins, Alan B.; Lutnick, Howard W., System and method for wireless gaming with location determination.
  860. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, System and method of accessing a network by way of different service providers.
  861. Hubbard, Dan; Tse, Alan, System and method of analyzing web addresses.
  862. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  863. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  864. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  865. Jackson, David Brian, System and method of brokering cloud computing resources.
  866. Kirkup, Michael G.; Little, Herbert A.; Yach, David P., System and method of connection control for wireless mobile communication devices.
  867. Kirkup,Michael G.; Little,Herbert A.; Yach,David P., System and method of connection control for wireless mobile communication devices.
  868. Hubbard, Dan, System and method of controlling access to the internet.
  869. Dozortsev, D'mitri, System and method of enforcing executable code identity verification over the network.
  870. Andres, Steven G.; Cole, David M.; Cummings, Thomas Gregory; Garcia, Roberto Ramon; Kenyon, Brian Michael; Kurtz, George R.; McClure, Stuart Cartier; Moore, Christopher William; O'Dea, Michael J.; Saruwatari, Ken D., System and method of managing network security risks.
  871. Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph; Kester, Harold M., System and method of monitoring and controlling application files.
  872. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  873. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  874. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  875. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  876. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  877. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  878. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  879. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  880. Kester, Harold M.; Kester Jones, legal representative, Nicole; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  881. Kester,Harold M.; Hegli,Ronald B.; Dimm,John Ross; Anderson,Mark Richard, System and method of monitoring and controlling application files.
  882. Beddoe, Marshall; Keir, Robin, System and method of operating system identification.
  883. Clairmont, James B.; Edwards, Karen S.; Ross, Darlene M.; Sears, Florence M.; Yager, Christopher S., System and method of preparing data for a semiconductor mask manufacturer.
  884. Kaleedhass, Kartik, System and method of preventing the transmission of known and unknown electronic content to and from servers or workstations connected to a common network.
  885. Doliov, Stephan, System and method to determine the validity of an interaction on a network.
  886. Doliov, Stephan, System and method to determine the validity of an interaction on a network.
  887. Doliov, Stephan, System and method to determine the validity of an interaction on a network.
  888. Doliov,Stephan, System and method to determine the validity of an interaction on a network.
  889. Doliov,Stephan, System and method to determine the validity of an interaction on a network.
  890. Steven, Doliov, System and method to determine the validity of an interaction on a network.
  891. Ekici, Ozgur; Islam, Muhammad Khaledul, System and method to increase link adaptation performance with multi-level feedback.
  892. Subramaniam, Pavitra; Zoss, Jason; Ying, Jian Jung; Caltabiano, Marc, System and method to search a database for records matching user-selected search criteria and to maintain persistency of the matched records.
  893. Kumar, Srinivas; Weber, Dean A.; Roth, Virginia L.; Shah, Shadab Munam, System and method using globally unique identities.
  894. Freund, Gregor P., System and methodology for protecting new computers by applying a preconfigured security update policy.
  895. Freund,Gregor, System and methodology for providing community-based security policies.
  896. Albert, Anthony; Kawamura, Kyle; Haycock, Keith; Herrmann, Conrad, System and methodology for security policy arbitration.
  897. Teixeira, Steven L., System and methodology providing information lockbox.
  898. Konanka, Dzmitry; Liahuski, Andrei, System and methodology providing secure workspace environment.
  899. Manohar, Pradheesh; Nalwaya, Prashant; Agrawal, Prashant Kumar, System and methods for automatically accessing a web site on behalf of a client.
  900. Master, Paul L.; Watson, John, System for adapting device standards after manufacture.
  901. Master, Paul L.; Watson, John, System for authorizing functionality in adaptable hardware devices.
  902. Master,Paul L.; Watson,John, System for authorizing functionality in adaptable hardware devices.
  903. St. Laurent, Michael D.; Krishnammagaru, Dharmesh; Tomlin, Craig A.; Kuindersma, Michael Edward; Stairs, Jonathan; Onischke, Mark; Clement, Conrad R., System for internet enabled printing.
  904. Hazlehurst, Peter; Aman, Matthew; Diego, Doug, System for performing web authentication of a user by proxy.
  905. Burke, II, Robert M.; Carman, David Z., System for regulating access to and distributing content in a network.
  906. McGee, Jason R.; Mitchell, Christopher C.; Morton, Michael J.; Peters, Brent A., System for sending messages to all users in a web hosting environment.
  907. Freund,Gregor; Haycock,Keith; Hermann,Conrad, System methodology for automatic local network discovery and firewall reconfiguration for mobile computing devices.
  908. Freund, Gregor Paul; Haycock, Keith Allan; Herrmann, Conrad Kamaha'o, System providing internet access management with router-based policy enforcement.
  909. Herrmann, Conrad K., System providing methodology for access control with cooperative enforcement.
  910. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  911. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  912. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  913. Bowman-Amuah Michel K., System, method and article of manufacture for security management in a development architecture framework.
  914. Davis, Michael Anthony; Lowe, Joe C.; Zeigler, Arthur S., System, method and computer program product for controlling network communications based on policy compliance.
  915. Davis, Michael Anthony; Lowe, Joe C.; Zeigler, Arthur S., System, method and computer program product for controlling network communications based on policy compliance.
  916. Sallam, Ahmed Said; Spurlock, Joel R., System, method, and computer program product for detecting unwanted activity associated with an object, based on an attribute associated with the object.
  917. Nicodemus,Blair Gaver; Bluestone,Derek; Adams,Clinton; Pappano,Joseph E.; Pressman,Howard M., System, method, apparatus and computer program product for facilitating digital communications.
  918. Nicodemus, Blair Gaver; Bluestone, Derek; Adams, Clinton; Pappano, Joseph E.; Pressman, Howard M., System, method, apparatus, and computer program product for facilitating digital communications.
  919. Pedersen, Bradley J.; Sinha, Rajiv; Sundarrajan, Prabakar; Treder, Terry, Systems and methods for accelerating delivery of a computing environment to a remote user.
  920. Venkatraman, Charu; He, Junxiao; Mullick, Amarnath; Nanjundaswamy, Shashi; Harris, James; Soni, Ajay, Systems and methods for application based interception SSI/VPN traffic.
  921. Mullick, Amarnath; Nanjundaswamy, Shashi; Venkatraman, Charu; He, Junxiao; Harris, James; Soni, Ajay, Systems and methods for application based interception of SSL/VPN traffic.
  922. Mullick, Amarnath; Venkatraman, Charu; He, Junxiao; Nanjundaswamy, Shashi; Harris, James; Soni, Ajay, Systems and methods for application based interception of SSL/VPN traffic.
  923. Venkatraman, Charu; He, Junxiao; Mullick, Amarnath; Nanjundaswamy, Shashi; Harris, James; Soni, Ajay, Systems and methods for application-based interception of SSL/VPN traffic.
  924. Pagan, Florence C. I.; Short, Joel E., Systems and methods for authorizing, authenticating and accounting users having transparent computer access to a network using a gateway device.
  925. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for automatic installation and execution of a client-side acceleration program.
  926. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for automatic installation and execution of a client-side acceleration program.
  927. Hawkins, Pete A., Systems and methods for chassis identification.
  928. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for client-side application-aware prioritization of network communications.
  929. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for communicating a lossy protocol via a lossless protocol.
  930. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements.
  931. Panasyuk,Anatoliy; Kramer,Andre; Pedersen,Bradley Jay; Stone,David Sean; Treder,Terry, Systems and methods for continuing an operation interrupted from a reconnection between a client and server.
  932. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for controlling user perceived connection speed.
  933. Kenny, Shane; Kenny, Aaron, Systems and methods for delegation and notification of administration of internet access.
  934. Kenny, Shane; Kenny, Aaron, Systems and methods for delegation and notification of administration of internet access.
  935. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  936. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  937. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for facilitating a peer to peer route via a gateway.
  938. Kolessar, Ronald S.; Jensen, James M.; Lynch, Wendell D., Systems and methods for gathering audience measurement data.
  939. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Systems and methods for maintaining a client's network connection thru a change in network identifier.
  940. Panasyuk,Anatoliy; Kramer,Andre; Pedersen,Bradley Jay; Stone,David Sean; Treder,Terry, Systems and methods for maintaining a session between a client and host service.
  941. Barton, Gary Lee; Feijoo, Ricardo Fernando, Systems and methods for managing printer settings in a networked computing environment.
  942. Petry, Scott M.; Akamine, Shinya; Lund, Peter Kevin; Cox, Fred; Oswall, Michael John, Systems and methods for managing the transmission of electronic messages through active message date updating.
  943. Petry, Scott M.; Akamine, Shinya; Lund, Peter K.; Cox, Fredric L.; Oswall, Michael J., Systems and methods for managing the transmission of electronic messages via message source data.
  944. Bales, Christopher E.; Mueller, Jeffrey; Owen, James; Patadia, Jalpesh; Olson, Nathan; Devgan, Manish; Noonan, Timothy, Systems and methods for personalizing a portal.
  945. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for providing a VPN solution.
  946. Alderucci, Dean; Asher, Joseph M.; Bahrampour, Robert F.; Burman, Kevin; Coffey, James J.; Rushin, Ronald, Systems and methods for providing access to wireless gaming devices.
  947. Alderucci, Dean; Asher, Joseph M.; Bahrampour, Robert F.; Burman, Kevin; Coffey, James J.; Rushin, Ronald, Systems and methods for providing access to wireless gaming devices.
  948. Alderucci, Dean; Asher, Joseph M.; Bahrampour, Robert F.; Burman, Kevin; Coffey, James J.; Rushin, Ronald, Systems and methods for providing access to wireless gaming devices.
  949. Alderucci, Dean; Burman, Kevin; Asher, Joseph M.; Coffey, James J.; Rushin, Ronald, Systems and methods for providing access to wireless gaming devices.
  950. Day, Jeff; Valdes, Roberto, Systems and methods for providing authentication credentials across application environments.
  951. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for providing client-side accelerated access to remote applications via TCP buffering.
  952. Sundarrajan, Prabakar; He, Junxiao; Nanjundaswamy, Shashi; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for providing client-side accelerated access to remote applications via TCP multiplexing.
  953. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil; Nanjundaswamy, Shashi, Systems and methods for providing client-side accelerated access to remote applications via TCP pooling.
  954. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil; Suganthi, Josephine, Systems and methods for providing client-side dynamic redirection to bypass an intermediary.
  955. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  956. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  957. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing content and services on a network system.
  958. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  959. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  960. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  961. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  962. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  963. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  964. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  965. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  966. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing dynamic network authorization, authentication and accounting.
  967. Short, Joel E; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing dynamic network authorization, authentication and accounting.
  968. Smith, Arthur Quentin, Systems and methods for providing self-services over television.
  969. Smith, Arthur Quentin, Systems and methods for providing self-services over television.
  970. Eden, Gideon, Systems and methods for selectively insulating a processor.
  971. Millington, Nicholas A. J., Systems and methods for synchronizing operations among a plurality of independently clocked digital data processing devices that independently source digital data.
  972. Short, Joel E.; Ewan, Ray S.; Sorcsek, Jerome, Systems and methods of communicating using XML.
  973. Harris, James; Venkatraman, Charu; He, Junxiao; Mullick, Amarnath; Nanjundaswamy, Shashi; Soni, Ajay, Systems and methods of fine grained interception of network communications on a virtual private network.
  974. Keromytis, Angelos D.; Stolfo, Salvatore J., Systems, methods, and media for generating bait information for trap-based defenses.
  975. Keromytis, Angelos D.; Stolfo, Salvatore J., Systems, methods, and media for generating bait information for trap-based defenses.
  976. Bates, Paul; Keyser-Allen, Lee; Lang, Jonathan P.; Roberts, Diane; Millington, Nicholas A. J., Systems, methods, apparatus, and articles of manufacture to provide guest access.
  977. Katragadda, Ramana; Spoltore, Paul; Howard, Ric, Task definition for specifying resource requirements.
  978. Schneider David S. ; Lipstone Laurence R. ; Jensen Daniel ; Ribet Michael B., Techniques for eliminating redundant access checking by access filters.
  979. Burch, Lloyd Leon; Carter, Stephen R.; Earl, Douglas G., Techniques for preserving and managing identities in an audit log.
  980. Teng, Joan C., Template based workflow definition.
  981. Pfeffer, Howard L., Tiered cost model for access to a computer network.
  982. Amaitis, Lee M.; Asher, Joseph M.; Lutnick, Howard W.; Mylet, Darrin M.; Wilkins, Alan B., Time and location based gaming.
  983. Amaitis, Lee M.; Asher, Joseph M.; Lutnick, Howard W.; Mylet, Darrin M.; Wilkins, Alan B., Time and location based gaming.
  984. Nguyen, Hong T; Silver, Edward M; Roberts, Linda A., Time control of internet usage.
  985. Lotvin, Mikhail; Nemes, Richard M., Tracking points related to a user account for online redemption.
  986. Pitroda, Satyan G.; Desai, Mehul, Transferring account information or cash value between an electronic transaction device and a service provider based on establishing trust with a transaction service provider.
  987. Hannel, Clifford Lee; May, Anthony, Tunneling using encryption.
  988. Farino,Mark William; Kolar,Mark Anthony; Twinam,David Christopher; Beliles, Jr.,Robert Pryor, Unified network and physical premises access control server.
  989. Desai, Mehul; Pitroda, Satyan G.; Maniar, Nehal, Updating a widget that was deployed to a secure wallet container on a mobile device.
  990. Lambourne, Robert A., Updating zone configuration in a multi-zone media system.
  991. Coons, Thomas L; Getler, Robert M; Landry, R Kent; Rogers, Steven B, Usage-based billing and management system and method for printers and other assets.
  992. Ikudome, Koichiro; Yeung, Moon Tai, User specific automatic data redirection system.
  993. Pitroda, Satyan G.; Desai, Mehul, Using confidential information to prepare a request and to suggest offers without revealing confidential information.
  994. Pfeffer, Howard L., Validating user experience type settings.
  995. Pfeffer, Howard L., Validating user experience type settings.
  996. Irlam,Gordon Raymond; Maggi,Brian; Petry,Scott, Value-added electronic messaging services and transparent implementation thereof using intermediate server.
  997. Petry,Scott M.; Irlam,Gordon R.; Maggi,Brian, Value-added electronic messaging services having web-based user accessible message center.
  998. Kling, John; Thompson, Bryan; Green, Ward, Verifying separation-of-duties at IAM system implementing IAM data model.
  999. Imachi Makoto,JPX ; Takahashi Toru,JPX ; Aoyama Yuki,JPX ; Hoshi Yukio,JPX, Version and configuration management method and apparatus and computer readable recording medium for recording therein version and configuration management program.
  1000. Owen, James; Conti, Joseph; Choe, Chang; Patadia, Jalpesh; Smith, Gregory, Virtual content repository application program interface.
  1001. Patadia, Jalpesh; McCauley, Rodney; Toussaint, Alexander, Virtual content repository browser.
  1002. Owen,James; Choe,Chang, Virtual repository complex content model.
  1003. Owen,James; Choe,Chang, Virtual repository content model.
  1004. Criddle, Linda; Milstein, David, Voice over internet protocol (VoIP) management.
  1005. Taylor,Patrick; Mewett,Scott; Brass,Philip C.; Doty,Theodore R., Vulnerability assessment and authentication of a computer by a local scanner.
  1006. O'Connell, Brian Marshall; Walker, Keith Raymond, Web browser-based programming language error determination and reporting.
  1007. Vaswani Rajendra ; Ho Eric Y. W., Web host providing for secure execution of CGI programs and method of doing the same.
  1008. Kann, Jong J.; Rafiq, Pierre P.; Murgia, Marco A., Web relay.
  1009. Bales, Christopher E.; Musson, Scott; Patadia, Jalpesh; Beecroft, Troy, Web service-enabled portlet wizard.
  1010. Porozni, Barry Ian; Nicodemus, Blair Gaver; Schille, Glenn Alan, Wireless access system, method, signal, and computer program product.
  1011. Sarkisian,Drew, Wireless communications invisible proxy and hooking systems and methods.
  1012. Harris, Scott C., Wireless network having multiple communication allowances.
  1013. Henry N. Holtzman ; Jeff Mock, Wireless transceiver for communicating with tags.
  1014. Kirkup, Michael G.; Brown, Michael K.; Little, Herbert A.; Robertson, Ian; Brown, Michael S., Wireless/wired mobile communication device with option to automatically block wireless communication when connected for wired communication.
  1015. Steinberg, Eran; Bigioi, Petronel; Raducan, Ilariu, Workflow system for detection and classification of images suspected as pornographic.
  1016. Petry, Scott M.; Akamine, Shinya; Lund, Peter K.; Cox, Fred; Oswall, Michael J., Zero-minute virus and spam detection.
  1017. Lambourne, Robert A., Zone configuration based on playback selections.
  1018. Lambourne, Robert A., Zone configurations maintained by playback device.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로