$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method for network address translation 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-012/66
출원번호 US-0027708 (1998-02-23)
발명자 / 주소
  • Aravamudan Murali
  • Tzeng Hong-Yi
출원인 / 주소
  • Lucent Technologies Inc.
인용정보 피인용 횟수 : 213  인용 특허 : 13

초록

A method for translating non internet unique addresses of a home network device to an internet unique address for internet communication through a router. Every device within a given home network is assigned three addresses:(i) a configured address identical to the network address of the router enab

대표청구항

[ What is claimed is:] [1.] In a data communications system comprising an internet and at least one home network, each of said home networks comprising a plurality of home network devices and having access to said internet through a router with an internet-unique network address, said system employi

이 특허에 인용된 특허 (13)

  1. Vu Hung T. (Ottawa CAX), Apparatus and method for providing a secure gateway for communication and data exchanges between networks.
  2. Hart Benjamin P., Apparatus and methods for routing data packets through a processing system network.
  3. Kinoshita Hiroyuki,JPX, Inter-LAN connecting device with combination of routing and switching functions.
  4. Dobbins Kurt A. ; Cullerot David L. ; Negus Stephen H. ; Haggerty William T., Internet protocol (IP) work group routing.
  5. Gervais Joseph L. ; Natarajan Alampoondi E. ; Allen Michael D. ; Perlman Radia J., Internetwork address mapping gateway.
  6. Fox Richard H. (Sunnyvale CA) Galloway Brett D. (Campbell CA 4), Method for translating internet protocol addresses to other distributed network addressing schemes.
  7. Derby Jeffrey H. (Chapel Hill NC) Doeringer Willibald A. (Langnau CHX) Dykeman Harold D. (Rueschlikon NC CHX) Li Liang (Chapel Hill NC) Sandick Haldon J. (Durham NC) Vu Ken V. (Cary NC), Methods and apparatus for interconnecting local area networks with wide area backbone networks.
  8. Nagami Kenichi,JPX ; Ami Junko,JPX ; Katsube Yasuhiro,JPX ; Saito Takeshi,JPX ; Esaki Hiroshi,JPX, Network interconnection apparatus, network node apparatus, and packet transfer method for high speed, large capacity in.
  9. Friedman Aharon ; Levy Ben Zion, Network security device which performs MAC address translation without affecting the IP address.
  10. Mayes John C. ; Coile Brantley W., Security system for network address translation systems.
  11. Templin Fred L. ; Gupta Ajay ; Skinner Gregory D. ; Tynan Dermot Matthew,IEX, Transparent and secure network gateway.
  12. Bollella Gregory ; Hogan Kathleen Marie ; Kompella Vachaspathi Peter ; Morse Alisa Lynn ; Pozefsky Diane Phylis ; Sarkar Soumitra, Transport gateway between a native network and a mixed network.
  13. Hirviniemi Seppo,FIX, Wide area network (WAN) interface for a transmission control protocol/internet protocol (TCP/IP) in a local area network.

이 특허를 인용한 특허 (213)

  1. Alkhatib,Hasan S.; Zhang,Yun Fei; Tobagi,Fouad A.; Elwailly,Farid F., Accessing an entity inside a private network.
  2. Oudet, Pascal, Address remapping for a bus.
  3. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  4. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  5. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  6. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  7. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  8. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  9. Larson, Victor; Short, III, Robert; Munger, Edmund; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  10. Larson,Victor; Short, III,Robert Dunham; Munger,Edmund Colby; Williamson,Michael, Agile network protocol for secure communications using secure domain names.
  11. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D., Agile network protocol for secure communications with assured system availability.
  12. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D.; Schmidt, Douglas Charles, Agile network protocol for secure communications with assured system availability.
  13. Munger, Edmund; Schmidt, Douglas; Short, III, Robert; Larson, Victor; Williamson, Michael, Agile network protocol for secure communications with assured system availability.
  14. Munger,Edmund Colby; Sabio,Vincent J.; Short, III,Robert Dunham; Gligor,Virgil D.; Schmidt,Douglas Charles, Agile network protocol for secure communications with assured system availability.
  15. Munger, Edmund Colby; Schmidt, Douglas Charles; Short, III, Robert Dunham; Larson, Victor; Williamson, Michael, Agile network protocol for secure video communications with assured system availability.
  16. Wang,Dongyan, Architecture for home network on world wide web with private-public IP address/URL mapping.
  17. Keith Franklin Falck ; Chinmei Chen Lee, Arrangement of delivering internet protocol datagrams for multimedia services to the same server.
  18. Wood, Samuel F.; Klein, Jerry A.; Asprey, Margaret Susan, Branch calling and caller ID based call routing telephone features.
  19. Wood, Samuel F.; Klein, Jerry A.; Asprey, Margaret Susan, Branch calling and caller ID based call routing telephone features.
  20. Meenan,Patrick; Damick,Jeffrey Joseph, Classifying devices using a local proxy server.
  21. Rodriguez Val,Richard; Watson, Jr.,Richard A., Client device identification when communicating through a network address translator device.
  22. Rodriguez Val,Richard; Watson, Jr.,Richard A., Client device identification when communicating through a network address translator device.
  23. Rodriguez-Val, Richard; Watson, Jr., Richard A., Client device identification when communicating through a network address translator device.
  24. Michaels, Thomas L.; Johnson, Russ A.; Hill, Eric D., Collapsible fluid collection and disposal system and related methods.
  25. Alkhatib, Hasan S.; Tabagi, Fouad A.; Elwailly, Farid F.; Wootton, Bruce C., Communicating with an entity inside a private network using an existing connection to initiate communication.
  26. Horibuchi, Takaaki, Communication device and communication method of the same.
  27. Mahalingaiah, Rupaka, Communication network having packetized security codes and a system for detecting security breach locations within the network.
  28. Alkhatib, Hasan; Tobagi, Fouad; Wootton, Bruce C, Communication using two addresses for an entity.
  29. Alkhatib,Hasan S.; Tobagi,Fouad A.; Wootton,Bruce C., Communication using two addresses for an entity.
  30. Averbuch, Aaron H.; Davis, David; James, Edward W.; Hobbs, Craig A., Configuring a secure network.
  31. Wood, Samuel F.; Klein, Jerry A.; Asprey, Margaret Susan, Controller for the intelligent interconnection of two communication networks, and method of use for same.
  32. Bardsley, Jeffrey Scott; Brock, Ashley Anderson; Kim, Nathaniel Wook; Lingafelt, Charles Steven, Correlating network information and intrusion information to find the entry point of an attack upon a protected computer.
  33. Alkhatib, Hasan S; Tobagi, Fouad A, Creating a public identity for an entity on a network.
  34. Golshan, Ali, DNS denial of service attack protection.
  35. Zhang, Shujin; Chu, Jie; Dos Santos, Maria Alice, Default internet traffic and transparent passthrough.
  36. Friedel, Michael, Distributed denial of service cellular signaling.
  37. Schuster, Guido M.; Borella, Michael S.; Grabelsky, David A.; Sidhu, Ikhlaq S., Distributed network address translation for a network telephony system.
  38. Munger,Edward Colby; Short, III,Robert Dunham; Larson,Victor; Williamson,Michael, Establishment of a secure communication link based on a domain name service (DNS) request.
  39. Lee,Michael C. G., Firewall for real-time internet applications.
  40. Gareau, Terrence, Flagging security threats in web service requests.
  41. Schuster, Guido M.; Sidhu, Ikhlaq S.; Dean, Frederick D.; Mahler, Jerry J.; Grabiec, Jacek A.; Bezaitis, Andrew, Flexible dial plan for a data network telephony system.
  42. Michaels, Thomas L.; Johnson, Russell A.; Hill, Eric D.; Patel, Hetal; Leadingham, Brian T., Fluid collection and disposal system and related methods.
  43. Michaels, Thomas L.; Johnson, Russ A.; Fedenia, Adam S.; Tang, Wen; Garrett, Frank; Kudrna, Otakar, Fluid collection and disposal system having interchangeable collection and other features and methods relating thereof.
  44. Michaels, Thomas L.; Johnson, Russ A.; Fedenia, Adam S.; Tang, Wen; Garrett, Frank; Kudrna, Otakar, Fluid collection and disposal system having interchangeable collection and other features and methods relating thereto.
  45. Michaels, Thomas L.; Johnson, Russ A.; Fedenia, Adam S.; Tang, Wen; Garrett, Frank; Kudrna, Otakar, Fluid collection and disposal system having interchangeable collection and other features and methods relating thereto.
  46. Sekiguchi, Kiyonori, Gateway apparatus for controlling apparatuses on home network.
  47. Thompson, Micheal; Groves, Vernon Richard, Health monitor based distributed denial of service attack mitigation.
  48. Thompson, Micheal; Groves, Vernon Richard, Health monitor based distributed denial of service attack mitigation.
  49. Ott, Maximilian A.; Reininger, Daniel J.; Makwana, Dhananjay; Singh, Manpreet, High-performance addressing and routing of data packets with semantically descriptive labels in a computer network.
  50. Ott,Maximilian; Reininger,Daniel Jorge; Makwana,Dhananjay; Singh,Manpreet, High-performance addressing and routing of data packets with semantically descriptive labels in a computer network.
  51. Kelley, Steve; Wilson, Jeremy; Erwin, Jeff, Home network optimizing system.
  52. Ha, Sam-Chul; Baek, Seung-Myun; Lee, Koon-Seok; Kim, Yong-Tae, Home network system.
  53. Lee, Koon-Seok; Koo, Feel-Young; Kim, Yong-Tae; Choi, Hwan-Jong; Baek, Seung-Myun; Koo, Ja-In; Kang, Seong-Hwan, Home network system.
  54. Lee, Koon-Seok; Baek, Seung-Myun; Choi, Hwan-Jong; Kim, Yong-Tae; Koo, Feel-Young; Koo, Ja-In; Kang, Seong-Hwan, Home network system and its configuration system.
  55. Chiles,David Clyde; Bosco,Eric, Home-networking.
  56. Chiles,David Clyde; Bosco,Eric, Home-networking.
  57. Jiang, Xuyang; Golshan, Ali, Implementing and optimizing secure socket layer intercept.
  58. Ishimura, Takanari, Information processing apparatus, information processing method, and non-transitory computer readable medium.
  59. Furukawa,Hisao; Miyaguchi,Shoji, Integrated information communication system for detecting and discarding external data packets that violate addressing rules.
  60. Furukawa, Hisao; Miyaguchi, Shoji, Integrated information communication system using conversion table to convert an external packet into an internal packet by embedding a header.
  61. Takabayashi, Kazuhiko; Nakano, Takehiko; Honda, Yasuaki; Igarashi, Tatsuya, Inter-device authentication system, inter-device authentication method, communication device, and computer program.
  62. Golshan, Ali; Jiang, Xuyang; Yang, Yang, Intercepting secure session upon receipt of untrusted certificate.
  63. Meenan,Patrick; Sengpiehl,Donald P.; Thornberg,Rich, Local proxy server for establishing device controls.
  64. O'Rourke,Chris; Housel,Barron C; Batz,Robert M; Klein,Steven C, Method allocation scheme for maintaining server load balancers services in a high throughput environment.
  65. Molitor, Andrew T., Method and apparatus for facilitating peer-to-peer application communication.
  66. Molitor, Andrew T., Method and apparatus for facilitating peer-to-peer application communication.
  67. Molitor, Andrew T., Method and apparatus for facilitating peer-to-peer application communication.
  68. Moriarty,Kathleen M., Method and apparatus for intercepting performance metric packets for improved security and intrusion detection.
  69. Squire, Matthew B.; Luciani, James V., Method and apparatus for network caching and load balancing.
  70. Subhash Bal ; Raghunath Iyer ; Sundar Iyer, Method and apparatus for performing internet network address translation.
  71. Mahalingaiah, Rupaka, Method and apparatus for providing continuous user verification in a packet-based network.
  72. Rao, Sanjay H.; Oxendine, Kenneth W.; Sigler, Richard, Method and apparatus for reducing load distribution delay in an internet protocol switch.
  73. Mahalingaiah, Rupaka, Method and apparatus for securing communication over public network.
  74. Yamaguchi,Kohei; Chimura,Yasubumi; Sakano,Tsuneyuki, Method and device for connecting networks.
  75. Yip, Michael; Merchant, Shehzad T.; Yin, Kenneth T., Method and system for VLAN aggregation.
  76. Yip, Michael; Merchant, Shehzad T.; Yin, Kenneth T.; Knudstrup, Eric, Method and system for VLAN aggregation.
  77. Burrows,Erik G., Method and system for assigning an IP address to a host based on features of the host.
  78. Frick, John Kevin; Heimsoth, Daniel Dean; Houghton, Jon Michael; Rovner, Edward Joel, Method and system for broadcast management in a data communication network that permits namesharing.
  79. Thomas, David Andrew, Method and system for managing communication in a computer network using aliases of computer network addresses.
  80. Thomas, David Andrew; Lynn, Brian K., Method and system for predicting connections in a computer network.
  81. Yip, Michael, Method and system of aggregate multiple VLANs in a metropolitan area network.
  82. Veits,Oliver, Method for data exchange between network elements in networks with different address ranges.
  83. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  84. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  85. Larson, Victor; Short, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing encrypted channel.
  86. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  87. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  88. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  89. Flockhart, Andrew Derek; Foster, Robin H.; Mathews, Eugene P.; Taylor, John Z., Method for providing customer treatment based on specified rules in conjunction with network source address of a request originator.
  90. Chu, Yue-Chuan; Hua, Ningming; Murray, John F., Method for providing voice-over-IP service.
  91. Chu,Yue Chuan; Hua,Ningming; Murray,John F, Method for providing voice-over-IP service.
  92. Chu,Yue Chuan; Hua,Ningming; Murray,John F., Method for providing voice-over-IP service.
  93. Brandt, Anders T., Method for triggered activation of an actuator.
  94. Ryu,Young Gyu; Lee,Gi Sik, Method for using a unique IP address in a private IP address domain.
  95. Baker, Albert D.; Lau, Richard Kwokchiu, Methods and apparatus for local network address acquisition, analysis and substitution.
  96. Cook,Michael; He,Enguang; O'Toole, Jr.,James W., Methods and apparatus for managing network traffic using network address translation.
  97. Carey,James Horan; Costa,Sergio dos Santos; Joyce,Glenn Joseph; McKenzie,Douglas Evans; White,Rex Armistead, Methods, systems and computer program products for translating internet protocol (IP) addresses located in a payload of a packet.
  98. Lynch,John; Squire,Matt; Williams,Rich, Methods, systems, and computer program products for classifying a packet based on a destination address.
  99. Jalan, Rajkumar; Kamat, Gurudeep; Szeto, Ronald Wai Lun, Mitigating TCP SYN DDoS attacks using TCP reset.
  100. Dingsor,Andrew D.; Lanzen,Craig A., Network Address Translation and Port Mapping.
  101. Cheriton, David R., Network address translation for multicast virtual sourcing.
  102. Cheriton, David R., Network address translation for multicast virtual sourcing.
  103. Marl, Brett; Averbuch, Aaron; O'leary, Myk; Lang, Joshua, Network administration tool.
  104. Hopmann, Alex; Marl, Brett; Yakeley, Ashley Colin; Holt, Nick; Hynoski, Joel; Bush, Steven; Tebbs, Matthew, Network administration tool employing a network administration protocol.
  105. Younger, Lauren; Jones, Caleb; Vandenberg, Greg; Owens, John-Anthony, Network advisor.
  106. Tebbs, Matthew; Marl, Brett, Network configuration device.
  107. Ha, Sam-Chul; Baek, Seung-Myun; Lee, Koon-Seok; Lim, Jeong-Hyun; Choi, Hwan-Jong; Koo, Ja-In; Kim, Dae-Woong; Kang, Sung-Hwan, Network control system for home appliances.
  108. Ha, Sam-Chul; Baek, Seung-Myun; Lee, Koon-Seok; Lim, Jeong-Hyun; Choi, Hwan-Jong; Koo, Ja-In; Kim, Dae-Woong; Kang, Sung-Hwan, Network control system for home appliances.
  109. Hopmann, Alex; Marl, Brett; Yakeley, Ashley Colin; Holt, Nick; Hynoski, Joel; Bush, Steven; Tebbs, Matthew, Network device management.
  110. Bush, Steven M.; Butcher, Thomas C.; Tebbs, Matthew; Ferrari, Justin; Marl, Brett; Gery, Ron; Acker, Kristin; Hinds, Joshua, Network management.
  111. Bush, Steven M.; Butcher, Thomas C.; Tebbs, Matthew; Ferrari, Justin; Marl, Brett; Gery, Ron; Acker, Kristin; Hinds, Joshua, Network management.
  112. Bush, Steven M.; Butcher, Thomas C.; Tebbs, Matthew; Ferrari, Justin; Marl, Brett; Gery, Ron; Acker, Kristin; Hinds, Joshua, Network management.
  113. Bush, Steve; Mooney, Steve; Liu, Xin; Mevissen, John; Hinds, Josh J; Gery, Ron; Marl, Brett; Tebbs, Matthew, Network management providing network health information and lockdown security.
  114. Ahlers, Tim; Mooney, Steve; Owens, John-Anthony; Vandenberg, Greg; O'Leary, Myk; Averbuch, Aaron; Wilson, Jeremy; Younger, Lauren, Network metric reporting system.
  115. Mahalingaiah, Rupaka, Network packet transmission mechanism.
  116. Ladd, Patrick, Network router apparatus and method.
  117. Cox Norman Eugene ; Gardo Russell Eugene ; Piucci Stephen W. ; Rovner Sonia K., Next hop resolution protocol cut-through to LANs.
  118. Short Joel E. ; Kleinrock Leonard, Nomadic translator or router.
  119. Tebbs, Matthew; Marl, Brett; Kelley, Steve, Optimal-channel selection in a wireless network.
  120. Yang, Yang; Golshan, Ali, Perfect forward secrecy distributed denial of service attack defense.
  121. Yang, Yang; Golshan, Ali, Perfect forward secrecy distributed denial of service attack defense.
  122. Yang, Yang; Golshan, Ali, Perfect forward secrecy distributed denial of service attack detection.
  123. O'Rourke, Chris; Housel, Barron C.; Batz, Robert M.; Klein, Steven C., Preallocation of client network address translation addresses for client-server networks.
  124. O'Rourke,Chris; Housel,Barron C; Batz,Robert M; Klein,Steven C, Preallocation of client network address translation addresses for client-server networks.
  125. Nomura, Yuji; Oguchi, Naoki; Tsuruoka, Tetsumei, Process and apparatus for speeding up layer 2 and layer 3 routing by determining layer 2 reach ability by determining whether layer 2 subnetworks are identical.
  126. Oguchi Naoki,JPX ; Tsuruoka Tetsumei,JPX, Process and apparatus for speeding-up layer-2 and layer-3 routing, and for determining layer-2 reachability, through a plurality of subnetworks.
  127. Schuster, Guido M.; Sidhu, Sagan S.; Sidhu, Ikhlaq S.; Grabiec, Jacek A., Proximity-based registration on a data network telephony system.
  128. Putzolu, David M., Recognizing audio and video streams over PPP links in the absence of an announcement protocol.
  129. Eisendrath,Benjamin; Spannbauer,Bradley; Smith, Jr.,Stanley O., Regulating concurrent logins associated with a single account.
  130. Cook, Fred S., Scheduled alias resolution.
  131. Nguyen, Han Q.; Cataltepe, Tayfun; Saad, Samir S., Service selection in a shared access network using virtual networks.
  132. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  133. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  134. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  135. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  136. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  137. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  138. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  139. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  140. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  141. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  142. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  143. Tighe,James R.; Higgins,Ronald D.; Platt,Richard B.; Bell,Robert T., System and method for a virtual telephony intermediary.
  144. Schuster, Guido M.; Sidhu, Ikhlaq S.; Mahler, Jerry J.; Dean, Frederick D.; Grabiec, Jacek A., System and method for advertising using data network telephone connections.
  145. Schuster, Guido M.; Belkind, Ronnen; Sidhu, Ikhlaq S.; Grabiec, Jacek A., System and method for associating notes with a portable information device on a network telephony call.
  146. Pagan, Florence C. I.; Short, Joel E., System and method for authorizing a portable communication device.
  147. Mazo,Joel S., System and method for automated network address cloning for routers.
  148. Schuster,Guido M.; Sidhu,Ikhlaq S.; Mahler,Jerry J.; Dean,Frederick D.; Grabiec,Jacek A., System and method for controlling telephone service using a wireless personal information device.
  149. Schuster, Guido M.; Grabiec, Jacek A.; Sidhu, Ikhlaq S.; Sidhu, Sagan S., System and method for enabling encryption/authentication of a telephony network.
  150. Pearce,Christopher E.; Whetten,Delon R.; Michalewicz,Larry G., System and method for enabling multicast telecommunications.
  151. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing a communication link.
  152. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing an encrypted communication link based on IP address lookup requests.
  153. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  154. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  155. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection with unknown network and/or user device.
  156. Short,Joel E.; Kleinrock,Leonard, System and method for establishing network connection with unknown network and/or user device.
  157. Tawil, Ahmad H.; Cherian, Jacob, System and method for generating world wide names.
  158. Schuster, Guido M.; Sidhu, Ikhlaq S.; Dean, Frederick D.; Belkind, Ronnen, System and method for interconnecting portable information devices through a network based telecommunication system.
  159. Pearce, Christopher E.; Whetten, Delon R.; Higgins, Ronald D.; Henning, Scott, System and method for maintaining a communication link.
  160. Chow,Peter Ka Fai; Tzeng,Shr Jie, System and method for performing layer 3 switching in a network device.
  161. Schuster, Guido M.; Sidhu, Ikhlaq S.; Bezaitis, Andrew; Gentles, Thomas, System and method for performing messaging services using a data communications channel in a data network telephone system.
  162. Renda,Gregory L; Cobbs,Archibald L; Jacobson,Van, System and method for providing access to a network with selective network address translation.
  163. Tighe, James R.; Higgins, Ronald D.; Platt, Richard B.; Bell, Robert T., System and method for providing security in a telecommunication network.
  164. Tighe,James R.; Higgins,Ronald D.; Platt,Richard B.; Bell,Robert T., System and method for providing security in a telecommunication network.
  165. Schuster, Guido M.; Sidhu, Ikhlaq S.; Mahler, Jerry J.; Dean, Frederick D.; Grabiec, Jacek A., System and method for providing telephone service having private branch exchange features in a voice-over-data network telephony system.
  166. Schuster, Guido M.; Grabiec, Jacek A.; Sidhu, Ikhlaq S.; Mahler, Jerry J., System and method for providing user-configured telephone service in a data network telephony system.
  167. Sidhu, Ikhlaq S.; Schuster, Guido M.; Dean, Frederick D.; Bezaitis, Andrew, System and method for providing user-configured telephone service in a data network telephony system.
  168. Paul A. Lecheler ; Harold G. Tillinghast, System and method for remote management of private networks having duplicate network addresses.
  169. Wilson Stephen K., System and method for resolving fibre channel device addresses on a network using the device's fully qualified domain name.
  170. Schuster, Guido M.; Sidhu, Ikhlaq S.; Mahler, Jerry J.; Dean, Frederick D.; Grabiec, Jacek A., System and method for sharing computer screens over a telephony network.
  171. Ahlers, Timothy F.; Averbuch, Aaron H.; Marl, Coyle B.; Owens, John-Anthony; Furlan, John L. W.; Kaplan, Jonathan; Braunstein, Ariel, System and method for simplifying secure network setup.
  172. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for using a registered name to connect network devices with a link that uses encryption.
  173. Boxall,Robert; Mulabegovic,Emir, System and method of providing computer networking.
  174. Garcia-Luna-Aceves, J. Joaquin; Spohn, Marcelo; Beyer, David A., System for communicating labeled routing trees to establish preferred paths and source routes with local identifiers in wireless computer networks.
  175. Michael W. Slemmer ; Roger D. McAulay, System for providing internet access from locations different from those for which the user's software was configured.
  176. Garcia-Luna-Aceves, J. Joaquin; Beyer, David A.; Frivold, Thane J., System for routing and switching in computer networks.
  177. Ortega, Juan Gaston, System, method and device to preserve protection communication active during a bypass operation.
  178. Pagan, Florence C. I.; Short, Joel E., Systems and methods for authorizing, authenticating and accounting users having transparent computer access to a network using a gateway device.
  179. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Systems and methods for connecting network devices over communication network.
  180. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for controlling user perceived connection speed.
  181. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  182. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  183. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing content and services on a network system.
  184. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  185. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  186. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  187. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  188. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  189. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  190. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  191. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  192. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing dynamic network authorization, authentication and accounting.
  193. Short, Joel E; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing dynamic network authorization, authentication and accounting.
  194. Armstrong, Jef Russell; Cohen, Andrew Jacob; Kulberda, Raymond William; Makwana, Dhananjay D.; Mershon, Jeffrey David; Reininger, Daniel J.; Mago, Rajeev, Systems and methods for providing semantically enhanced identity management.
  195. Mershon, Jeffrey David; Armstrong, Jef Russell; Reininger, Daniel J.; Cohen, Andrew Jacob; Kulberda, Raymond William; Makwana, Dhananjay D.; Mago, Rajeev, Systems and methods for the management of information to enable the rapid dissemination of actionable information.
  196. Wood, Samuel F.; Klein, Jerry A.; Asprey, Margaret Susan, Tandem access controller within the public switched telephone network.
  197. Wood, Samuel F.; Klein, Jerry A.; Asprey, Margaret Susan, Tandem access controller within the public switched telephone network.
  198. Wood, Samuel F.; Klein, Jerry A.; Asprey, Margaret Susan, Tandem access controller within the public switched telephone network.
  199. Wood, Samuel F.; Klein, Jerry A.; Asprey, Margaret Susan, Tandem access controller within the public switched telephone network.
  200. Furukawa, Hisao; Miyaguchi, Shoji, Terminal to-terminal communication connection control method using IP transfer network.
  201. Furukawa, Hisao; Miyaguchi, Shoji, Terminal-to-terminal communication connection control method using IP transfer network.
  202. Furukawa, Hisao; Miyaguchi, Shoji, Terminal-to-terminal communication connection control method using IP transfer network.
  203. Furukawa, Hisao; Miyaguchi, Shoji, Terminal-to-terminal communication connection control method using IP transfer network.
  204. Furukawa, Hisao; Miyaguchi, Shoji, Terminal-to-terminal communication connection control method using IP transfer network.
  205. Furukawa, Hisao; Miyaguchi, Shoji, Terminal-to-terminal communication connection control method using IP transfer network.
  206. Furukawa,Hisao; Miyaguchi,Shoji, Terminal-to-terminal communication connection control method using IP transfer network.
  207. Furukawa,Hisao; Miyaguchi,Shoji, Terminal-to-terminal communication connection control method using IP transfer network.
  208. Furukawa,Hisao; Miyaguchi,Shoji, Terminal-to-terminal communication connection control system for IP full service.
  209. Zee, Oscar; Nylander, Tomas; Vikberg, Jari, Topology determination in a communications network.
  210. Pullela, Venkateshwar Rao; Kaluve, Shyamasundar, Translating native medium access control (MAC) addresses to hierarchical MAC addresses and their use.
  211. Arrow Leslie J. ; Bots Henk J. ; Hoke Mark R. ; Hunt William E. ; Huntley Bruce T., Translating packet addresses based upon a user identifier.
  212. Smith,Cameron; Ositis,Vilis, Transparent load balancer for network connections.
  213. Garcia Luna Aceves,J Joaquin; Beyer,David A.; Frivold,Thane J., Unified routing scheme for ad-hoc internetworking.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로