$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Firewall providing enhanced network security and user transparency 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-013/00
출원번호 US-0299941 (1999-04-26)
발명자 / 주소
  • Wesinger
  • Jr. Ralph E.
  • Coley Christopher D.
출원인 / 주소
  • Network Engineering Software, Inc.
대리인 / 주소
    McDonnell Boehnen Hulbert & Berghoff
인용정보 피인용 횟수 : 162  인용 특허 : 10

초록

The present invention, generally speaking, provides a firewall that achieves maximum network security and maximum user convenience. The firewall employs "envoys" that exhibit the security robustness of prior-art proxies and the transparency and ease-of-use of prior-art packet filters, combining the

대표청구항

[ What is claimed is:] [1.] In a computer networking environment having a plurality of firewall nodes on a path between a first terminal and a host terminal, where the firewall nodes delineate one network segment from another network segment, a method of establishing a communication link comprising

이 특허에 인용된 특허 (10)

  1. Bernauer Karl (Oberwil CHX) Borgulya Janos (Basel CHX) Bruderer Hans (Biel-Benken CHX) Da Prada Mose (Riehen CHX) Zurcher Gerhard (Basel CHX), Catechol derivatives.
  2. Elgamal Taher (Palo Alto CA), Electronic commerce using a secure courier system.
  3. Wesinger ; Jr. Ralph E. ; Coley Christopher D., Firewall providing enhanced network security and user transparency.
  4. Sherer William P., Method and apparatus for providing secure network communications.
  5. Pepe David Mathew (Middletown NJ) Blitzer Lisa B. (Manalapan NJ) Brockman James Joseph (Perrineville NJ) Cruz William (Eatontown NJ) Hakim Dwight Omar (Matawan NJ) Hovey Richard Reid (Somerville NJ) , System and method for providing protocol translation and filtering to access the world wide web from wireless or low-ban.
  6. Civanlar Seyhan (Middletown Township ; Monmouth County NJ) Saksena Vikram R. (Freehold NJ), System for binding host name of servers and address of available server in cache within client and for clearing cache pr.
  7. Boebert William E. ; Rogers Clyde O. ; Andreas Glenn ; Hammond Scott W. ; Gooderum Mark P., System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting.
  8. Civanlar Seyhan ; Saksena Vikram R., System for updating mapping or virtual host names to layer-3 address when multimedia server changes its usage state to b.
  9. Yu Kin C., Virtual local area network well-known port routing mechanism for mult--emulators in an open system environment.
  10. Wesinger ; Jr. Ralph E. ; Coley Christopher D., Web server employing multi-homed, moldular framework.

이 특허를 인용한 특허 (162)

  1. Fan Serene ; Truong Steve, Access control for networks.
  2. Epstein, Jeremy; Thomas, Linda, Advanced data guard having independently wrapped components.
  3. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  4. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  5. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  6. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  7. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  8. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  9. Larson, Victor; Short, III, Robert; Munger, Edmund; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  10. Larson,Victor; Short, III,Robert Dunham; Munger,Edmund Colby; Williamson,Michael, Agile network protocol for secure communications using secure domain names.
  11. Edmund Colby Munger ; Douglas Charles Schmidt ; Robert Dunham Short, III ; Victor Larson ; Michael Williamson, Agile network protocol for secure communications with assured system availability.
  12. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D., Agile network protocol for secure communications with assured system availability.
  13. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D.; Schmidt, Douglas Charles, Agile network protocol for secure communications with assured system availability.
  14. Munger, Edmund Colby; Schmidt, Douglas Charles; Short, Robert Dunham; Larson, Victor; Williamson, Michael, Agile network protocol for secure communications with assured system availability.
  15. Munger, Edmund; Schmidt, Douglas; Short, III, Robert; Larson, Victor; Williamson, Michael, Agile network protocol for secure communications with assured system availability.
  16. Munger,Edmund Colby; Sabio,Vincent J.; Short, III,Robert Dunham; Gligor,Virgil D.; Schmidt,Douglas Charles, Agile network protocol for secure communications with assured system availability.
  17. Munger,Edmund Colby; Sabio,Vincent J.; Short,Robert Dunham; Gligor,Virgil D.; Schmidt,Douglas Charles, Agile network protocol for secure communications with assured system availability.
  18. Schmidt, Douglas Charles; Short, III, Robert Dunham, Agile network protocol for secure communications with assured system availability.
  19. Munger, Edmund Colby; Schmidt, Douglas Charles; Short, III, Robert Dunham; Larson, Victor; Williamson, Michael, Agile network protocol for secure video communications with assured system availability.
  20. Wise, Michael; Singer, Howard M., Apparatus, method and system to implement an integrated data security layer.
  21. Nice, Nir; Ananiev, Oleg; Wohlfert, John F.; Finkelstein, Amit; Teplitsky, Alexander, Authentication for distributed secure content management system.
  22. Nice, Nir; Ananiev, Oleg; Wohlfert, John; Finkelstein, Amit; Teplitsky, Alik, Authentication in a globally distributed infrastructure for secure content management.
  23. Hariu, Takeo, Concentrated system for controlling network interconnections.
  24. Cook, Jeffrey; Wu, Handong; Foster, Lindy, DNS server access control system and method.
  25. Krumel, Andrew K., Data protection system selectively altering an end portion of packets based on incomplete determination of whether a packet is valid or invalid.
  26. Wittman, Brian Albert, Data traffic filtering indicator.
  27. Wetherall, David J.; Savage, Stefan R.; Anderson, Thomas E., Detecting and preventing undesirable network traffic from being sourced out of a network domain.
  28. Stolorz, Paul E.; Salmon, John K.; Warren, Michael S.; Koller, Jeffrey G.; Hagberg, Aric; Yevmenkin, Maksim; Brady, Mark; Pfitzner, David; Middleton, Ted, Detecting anomalous conditions in a name server network.
  29. Stolorz, Paul E.; Salmon, John K.; Warren, Michael S.; Koller, Jeffrey G.; Hagberg, Aric; Yevmenkin, Maksim; Brady, Mark; Pfitzner, David; Middleton, Ted, Distributing requests across multiple content delivery networks based on subscriber policy.
  30. Yadav, Navindra; Scheib, Ellen; Agasthy, Rachita, Domain name system (DNS) based anomaly detection.
  31. Blumenfeld,Steven M.; Raduchel,William J., Electronic loose-leaf remote control for enabling access to content from a media player.
  32. Hudis, Efim; Edery, Yigal; Ananiev, Oleg; Wohlfert, John; Nice, Nir, Enterprise security assessment sharing for consumers using globally distributed infrastructure.
  33. Hudis, Efim; Edery, Yigal; Ananiev, Oleg; Wohlfert, John; Nice, Nir, Enterprise security assessment sharing for off-premise users using globally distributed infrastructure.
  34. Kunzinger, Charles A., Establishing consistent, end-to-end protection for a user datagram.
  35. Munger,Edward Colby; Short, III,Robert Dunham; Larson,Victor; Williamson,Michael, Establishment of a secure communication link based on a domain name service (DNS) request.
  36. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Firewall providing enhanced network security and user transparency.
  37. Kortum, Philip; Sullivan, Marc A., Firewall switching system for communication system applications.
  38. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  39. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  40. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  41. Gupta,Ramesh M.; Jain,Parveen K.; Amidon,Keith E.; Gong,Fengmin; Vissamsetti,Srikant; Haeffele,Steve M.; Raman,Ananth, Hierarchy-based method and apparatus for detecting attacks on a computer system.
  42. Wu, Handong; Sufleta, Zbigniew, High performance packet processing using a general purpose processor.
  43. Wu, Handong; Sufleta, Zbigniew, High performance packet processing using a general purpose processor.
  44. Felsher, David Paul, Information record infrastructure, system and method.
  45. Haeffele, Steven M.; Gupta, Ramesh M.; Raman, Ananth; Vissamsetti, Srikant, Integrated firewall, IPS, and virus scanner system and method.
  46. Haeffele, Steven M.; Gupta, Ramesh M.; Raman, Ananth; Vissamsetti, Srikant, Integrated firewall, IPS, and virus scanner system and method.
  47. Kunzinger,Charles A., Integrated system for network layer security and fine-grained identity-based access control.
  48. Dark,Susan Pittman, Intelligent feedback loop process control system.
  49. Zuk, Nir, Intelligent integrated network security device.
  50. Zuk, Nir, Intelligent integrated network security device.
  51. Zuk, Nir, Intelligent integrated network security device.
  52. Zuk, Nir, Intelligent integrated network security device.
  53. Zuk, Nir; Mao, Yu Ming; Guruswamy, Kowsik, Intelligent integrated network security device for high-availability applications.
  54. Zuk, Nir; Mao, Yu Ming; Guruswamy, Kowsik, Intelligent integrated network security device for high-availability applications.
  55. Zuk, Nir; Mao, Yu Ming; Guruswamy, Kowsik, Intelligent integrated network security device for high-availability applications.
  56. Zuk, Nir; Mao, Yuming; Guruswamy, Kowsik, Intelligent integrated network security device for high-availability applications.
  57. Wu,Shyhtsun Felix; Fei,Aiguo; Gong,Fengmin, Method and apparatus for adaptively classifying network traffic.
  58. Ivory, Christopher Joseph, Method and apparatus for connection-oriented multiplexing and switching network analysis, management, and troubleshooting.
  59. Fei, Aiguo; Sun, Kai; Gong, Fengmin, Method and apparatus for detecting a distributed denial of service attack.
  60. Gupta, Ramesh M.; Jain, Parveen K.; Amidon, Keith E.; Gong, Fengmin; Vissamsetti, Srikant; Haeffele, Steve M.; Raman, Ananth, Method and apparatus for detecting intrusions on a computer system.
  61. Bu, Zheng; Gong, Fengmin, Method and apparatus for detecting shellcode.
  62. Coile, Brantley W.; Howes, Richard A.; LeBlanc, William M., Method and apparatus for eliminating use of a transfer protocol on a proxied connection.
  63. Lingafelt,Charles Steven; McKenna,John Joseph; Sisk,Robert Barry, Method and apparatus for protecting a web server against vandals attacks without restricting legitimate access.
  64. Kawamoto, Youji, Method and apparatus for providing information for decrypting content, and program executed on information processor.
  65. Strentzsch Scott A. ; Donzis Lewis T., Method and apparatus for providing network access control using a domain name system.
  66. Coile,Brantley W.; Howes,Richard A.; LeBlanc,William M., Method and apparatus for reducing overhead on a proxied connection.
  67. Frick, John Kevin; Heimsoth, Daniel Dean; Houghton, Jon Michael; Rovner, Edward Joel, Method and system for broadcast management in a data communication network that permits namesharing.
  68. Malan, Gerald R.; Jahanian, Farnam, Method and system for profiling network flows at a measurement point within a computer network.
  69. Bondar, Gregory; Baram, Nir, Method and system for providing a web service by a plurality of web domains through a single IP address.
  70. Fenton, Charles S.; Shafer, Keith E., Method and system for secure communication.
  71. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for authenticating a user access request.
  72. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for authenticating a user access request.
  73. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  74. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  75. Larson, Victor; Short, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing encrypted channel.
  76. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  77. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  78. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  79. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  80. Larson,Victor; Short, III,Robert Durham; Munger,Edmund Colby; Williamson,Michael, Method for establishing secure communication link between computers of virtual private network.
  81. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network without user entering any cryptographic information.
  82. Bourgeois, III, Fred J., Method for implementing polyinstantiated access control in computer operating systems.
  83. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  84. Brawn,John Melvin; Jemes,Brian; Froelich,Stephen F., Method of creating an address and a discontiguous mask for a network security policy area.
  85. Joyce, James B., Methods and apparatus for heuristic firewall.
  86. Balabine, Igor, Methods and apparatus for securing access to a computer.
  87. Krumel,Andrew K., Methods for packet filtering including packet invalidation if packet validity determination not timely made.
  88. Krumel, Andrew K., Methods for updating the configuration of a programmable packet filtering device including a determination as to whether a packet is to be junked.
  89. Ganis, Mathew R.; Gupta, Kapil; Leip, David; Rozas, Santiago M.; Rusch, Klaus Johannes, Methods, systems, and computer program products for providing customized content over a network.
  90. Jean, Sebastien, Mimic support address resolution.
  91. Jean, Sebastien A., Mimic support address resolution.
  92. Hoffberg, Steven M., Multifactorial optimization system and method.
  93. Jean, Sebastien A.; Purpura, Don Francis; Iwamoto, Neil Y., Network device mimic support.
  94. Blumenfeld, Steven M.; Raduchel, William J., Out-of band tokens for rights access.
  95. Blumenfeld, Steven M.; Raduchel, William J., Out-of-band tokens for rights access.
  96. Blumenfeld, Steven M.; Raduchel, William J., Out-of-band tokens for rights access.
  97. Blumenfeld, Steven M.; Raduchel, William J., Out-of-band tokens for rights access.
  98. Blumenfeld,Steven M.; Raduchel,William J., Out-of-band tokens for rights access.
  99. Krumel,Andrew K., PLD-based packet filtering methods with PLD configuration data update of filtering rules.
  100. Stolorz, Paul E.; Salmon, John K.; Warren, Michael S.; Koller, Jeffrey G.; Yevmenkin, Maksim; Brady, Mark; Pfitzner, David; Middleton, Ted; Hagberg, Aric, Policy-based content delivery network selection.
  101. Munger, Edmund Colby; Schmidt, Douglas Charles; Short, III, Robert Dunham; Larson, Victor, Preventing packet flooding of a computer on a computer network.
  102. Gupta,Ramesh M.; Jain,Parveen K.; Amidon,Keith E.; Gong,Fengmin; Vissamsetti,Srikant; Haeffele,Steve M.; Raman,Ananth, Protocol-parsing state machine and method of using same.
  103. Blumenfeld, Steven M.; Raduchel, William J., Regulating access to content using a multitiered rule base.
  104. Yee, Steven C; Gandhi, Mauktik H; Hall, Brian R.; Kakumani, Vikram; Mitchell, Michael; Shubin, Tatiana, Reputation driven firewall.
  105. Cohen,Josh R.; Kramer,Michael; Hammond,Bradley M.; Roberts,Paul; Simon,Daniel R.; Butler,Lee M.; Zhu,Yuhang, Secure end-to-end notification.
  106. Magdych, James S.; Rahmanovic, Tarik; McDonald, John R.; Tellier, Brock E.; Osborne, Anthony C.; Herath, Nishad P., Secure gateway for analyzing textual content to identify a harmful impact on computer systems with known vulnerabilities.
  107. Magdych, James S.; Rahmanovic, Tarik; McDonald, John R.; Tellier, Brock E.; Osborne, Anthony C.; Herath, Nishad P., Secure gateway with firewall and intrusion detection capabilities.
  108. Brawn,John Melvin; Klein,Christian, Secure network and method of establishing communication amongst network devices that have restricted network connectivity.
  109. Whitmer,Ray; Dhurvasula,Harish, Securing resources from untrusted scripts behind firewalls.
  110. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  111. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  112. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  113. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  114. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  115. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  116. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  117. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  118. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  119. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  120. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  121. Sharp, Clifford F.; Dark, Susan P., System and method for detecting and eliminating IP spoofing in a data transmission network.
  122. Sharp,Clifford F.; Dark,Susan Pittman, System and method for detecting and eliminating IP spoofing in a data transmission network.
  123. Hoffberg, Steven M., System and method for determining contingent relevance.
  124. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing a communication link.
  125. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing an encrypted communication link based on IP address lookup requests.
  126. Jemes,Brian; Brawn,John Melvin; Garcia,Joseph; Milligan,Michael; Pape,John M.; Hansell,Jeff, System and method for implementing network security policies on a common network infrastructure.
  127. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  128. Epstein, Jeremy; Thomas, Linda, System and method for increasing the resiliency of firewall systems.
  129. Crocker, Kenneth Lynn; Jiang, Wei; Pall, Gurdeep Singh; Aboba, Bernard D.; Gidwani, Narendra C., System and method for maintaining network system information.
  130. Crocker,Kenneth Lynn; Jiang,Wei; Pall,Gurdeep Singh; Aboba,Bernard D.; Gidwani,Narendra C., System and method for maintaining network system information.
  131. Yang,Xuechen, System and method for managing dynamic network sessions.
  132. Wu,Handong; Cook,Jeff, System and method for protecting internet protocol addresses.
  133. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  134. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  135. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  136. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  137. Balasubramaniyan, Jai S., System and method for securing a communication network.
  138. Sharp, Clifford F.; Dark, Susan Pittman, System and method for traffic management control in a data transmission network.
  139. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for using a registered name to connect network devices with a link that uses encryption.
  140. Brawn,John Melvin; Jemes,Brian; Froelich,Stephen F., System and method of aggregating discontiguous address ranges into addresses and masks using a plurality of repeating address blocks.
  141. Van Gunter,David; Waters,Lester L., System and method of user authentication for network communication through a policy agent.
  142. Freund,Gregor, System and methodology for providing community-based security policies.
  143. Schumacher, Michael K., System for selectively blocking execution of applications on a computer system.
  144. Kashyap, Rahul Chander, System, method and computer program product for detecting encoded shellcode in network traffic.
  145. Minkin, Ilya; Balabine, Igor V.; Eschelbeck, Gerhard, System, method and computer program product for rule based network security policies.
  146. Zhou, Steven Y., Systems and methods for address spacing in a firewall cluster.
  147. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Systems and methods for connecting network devices over communication network.
  148. Maestas, David Edward; Cooper, Brian Louis, Systems and methods for determining a flow of data.
  149. Kelly, Thomas J.; Wood, Daniel C.; Ferguson, Alan L.; Bierdeman, Paul W.; Jenkins, Brian L.; Meiss, Trent R.; Swanson, Andrew J., Systems and methods for performing protocol conversions in a machine.
  150. Kelly, Thomas J.; Wood, Daniel C.; Ferguson, Alan L.; Bierdeman, Paul W.; Jenkins, Brian L.; Meiss, Trent R.; Swanson, Andrew J., Systems and methods for providing proxy control functions in a work machine.
  151. Kelly, Thomas J.; Wood, Daniel C.; Ferguson, Alan L.; Bierdeman, Paul W.; Jenkins, Brian L.; Meiss, Trent R.; Swanson, Andrew J., Systems and methods for providing server operations in a work machine.
  152. Bonner,Thomas W., Systems and methods for updating dynamic IP addresses in a firewall using a DDNS server.
  153. Attwood, Kira Sterling; Overby, Jr., Linwood Hugh; Sun, Chien-En, Technique of defending against network flooding attacks using a connectionless protocol.
  154. Zoka, Ron, Touch scan internet credit card verification purchase process.
  155. Black, Darryl; Winiewicz, Anne K., Tracking distributed data retrieval in a network device.
  156. Stirbu, Vlad, UPnP VPN gateway configuration service.
  157. Gbadegesin, Abolade; Murching, Arvind M.; Thaler, David G.; Sanders, Henry L.; Gidwani, Narendra C.; Mayfield, Paul G., Unified architecture for remote network access.
  158. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Virtual host for protocol transforming traffic traversing between an IP-compliant source and non-IP compliant destination.
  159. Rangegowda, Dharshan; Goldian, Jeffrey R., Virtual host security profiles.
  160. Gupta,Ramesh M.; Jain,Parveen K.; Amidon,Keith E.; Gong,Fengmin; Vissamsetti,Srikant; Haeffele,Steve M.; Raman,Ananth, Virtual intrusion detection system and method of using same.
  161. Haghpassand, Joshua, Web-based security and filtering system for inbound/outbound communications with proxy chaining.
  162. Haghpassand, Joshua, Web-based security and filtering system with proxy chaining.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로