$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Virtual private network system and method 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-013/00
출원번호 US-0013122 (1998-01-26)
발명자 / 주소
  • Paulsen Gaige B.
  • Walker Amanda
출원인 / 주소
  • Ascend Communications, Inc.
대리인 / 주소
    Weingarten, Schurgin, Gagnebin & Hayes LLP
인용정보 피인용 횟수 : 175  인용 특허 : 5

초록

A system and method for remote users to access a private network having a first communications protocol via a public network, such as any TCP/IP network having a second different communications protocol, in a secure manner so that the remote user appears to be connected directly to the private netwo

대표청구항

[ What is claimed is:] [1.] A method for forming a virtual node for a private access network having a private access communications protocol over a public access network having a public access communications protocol, the virtual node being a remote computer and the method comprising:establishing a

이 특허에 인용된 특허 (5)

  1. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  2. Aziz Ashar (Fremont CA), Method and apparatus for key-management scheme for use with internet protocols at site firewalls.
  3. Gelb Edward J. (Wayne NJ), Security system for preventing unauthorized communications between networks by translating communications received in ip.
  4. Shwed Gil,ILX ; Kramer Shlomo,ILX ; Zuk Nir,ILX ; Dogon Gil,ILX ; Ben-Reuven Ehud,ILX, System for securing the flow of and selectively modifying packets in a computer network.
  5. Aziz Ashar (Fremont CA) Mulligan Geoffrey (Fremont CA) Patterson Martin (Grenoble FRX) Scott Glenn (Sunnyvale CA), System for signatureless transmission and reception of data packets between computer networks.

이 특허를 인용한 특허 (175)

  1. Araujo, Kenneth S.; Best, Reginald P.; Douglas, Christopher P.; Heitmueler, Devin J.; Zhang, Siuling C.; Isayev, Gamid, APPARATUS AND ACCOMPANYING METHODS FOR PROVIDING, THROUGH A CENTRALIZED SERVER SITE, AN INTEGRATED VIRTUAL OFFICE ENVIRONMENT, REMOTELY ACCESSIBLE VIA A NETWORK-CONNECTED WEB BROWSER, WITH REMOTE NET.
  2. Alkhatib,Hasan S.; Zhang,Yun Fei; Tobagi,Fouad A.; Elwailly,Farid F., Accessing an entity inside a private network.
  3. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  4. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  5. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  6. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  7. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  8. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D., Agile network protocol for secure communications with assured system availability.
  9. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D.; Schmidt, Douglas Charles, Agile network protocol for secure communications with assured system availability.
  10. Munger, Edmund Colby; Schmidt, Douglas Charles; Short, III, Robert Dunham; Larson, Victor; Williamson, Michael, Agile network protocol for secure video communications with assured system availability.
  11. Marchok, Daniel J.; Kapoor, Samir; Chandran, Ravi, Apparatus and method for clock synchronization in a multi-point OFDM/DMT digital communications system.
  12. Marchok, Daniel J.; Kapoor, Samir; Chandran, Ravi, Apparatus and method for clock synchronization in a multi-point OFDM/DMT digital communications system.
  13. Callon,Ross W.; Renwick,John K., Apparatus and method for forwarding encapsulated data packets on a network having multiple links between nodes.
  14. Somasundaram, Mahadev, Apparatus and methods for handling shared services through virtual route forwarding (VRF)-aware-NAT.
  15. Sedayao, Jeff; Vicente, John; Rungta, Sanjay; Chan, Winson, Apparatus for end-user transparent utilization of computational, storage, and network capacity of mobile devices, and associated methods.
  16. Sedayao, Jeff; Vicente, John; Rungta, Sanjay; Chan, Winson, Apparatus for end-user transparent utilization of computational, storage, and network capacity of mobile devices, and associated methods.
  17. Bots, Henk J.; Hunt, William E.; Palma, Derek; Lawler, John, Architecture for virtual private networks.
  18. Bots,Henk J.; Hunt,William E.; Palma,Derek; Lawler,John, Architecture for virtual private networks.
  19. Sun,Ray; Koch,Zeke; Zhang,Yu, Automatic client authentication for a wireless network protected by PEAP, EAP-TLS, or other extensible authentication protocols.
  20. Tillotson, Timothy Nephi; Ting, Sara; Berg, Nathan A., Automatic creation of protocol dependent control path for instrument application.
  21. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Automatically reconnecting a client across reliable and persistent communication sessions.
  22. Montenegro, Gabriel E., Chained registrations for mobile IP.
  23. Caronni, Germano; Gupta, Amit; Markson, Tom R.; Kumar, Sandeep; Schuba, Christoph L.; Scott, Glenn C., Channel-specific file system views in a private network using a public-network infrastructure.
  24. Pedersen, Brian Dam; Vendelbo, Allan Munk, Client device with certificate and related method.
  25. Xu, Qing, Cloud-based security policy configuration.
  26. Xu, Qing, Cloud-based security policy configuration.
  27. Alkhatib, Hasan S., Communicating between address spaces.
  28. Alkhatib, Hasan S.; Tabagi, Fouad A.; Elwailly, Farid F.; Wootton, Bruce C., Communicating with an entity inside a private network using an existing connection to initiate communication.
  29. Nakayama Ryo,JPX ; Iwamoto Isamu,JPX, Content protection method and content protection system.
  30. Olofsson, Lars Olof Stefan; Khan, Atif; Raza, Syed Khalid; Shah, Himanshu H.; Khan, Amir; Bhau, Nehal, Context specific keys.
  31. Tagg, James P., Cooperative network for mobile internet access.
  32. Alkhatib, Hasan S; Tobagi, Fouad A, Creating a public identity for an entity on a network.
  33. Ding, Gang; Rungta, Sanjay; Vicente, John; Chan, Winson C.; Krishnaswamy, Dilip, Cross-layer approach to virtualized overlay on ad hoc networks.
  34. Caronni,Germano; Gupta,Amit; Markson,Tom R.; Kumar,Sandeep; Schuba,Christoph L.; Scott,Glenn C., Decoupling access control from key management in a network.
  35. Trostle,Jonathan; Bell,Raymond; Golla,Ramprasad; Srivastava,Sunil, Directory enabled secure multicast group communications.
  36. Trostle,Jonathan; Bell,Raymond; Golla,Ramprasad; Srivastava,Sunil, Directory enabled secure multicast group communications.
  37. Pillai,Vikram; Kinsella,Joseph; Bray,Patrick; White,Noah; MacCallum,Deborah; Klotz,Robert; Bruell,Gregory O., Distributed network monitoring and control system.
  38. Perry,James R.; Snow,Kevin D.; Black,Darryl, Distributed user management information in telecommunications networks.
  39. Hasan S. Alkhatib, Domain name routing.
  40. Graham, Todd D.; Hudson, Jonathan C., Dynamic file access control and management.
  41. Panasyuk, Anatoliy; Pedersen, Bradley J.; Stone, David; Treder, Terry, Encapsulating protocol for session persistence and reliability.
  42. Gundavelli, Srinath; McNamee, David, Establishing a new shared secret key over a broadcast channel for a multicast group based on an old shared secret key.
  43. Kunzinger, Charles A., Establishing consistent, end-to-end protection for a user datagram.
  44. Pellacuru,Chinna Narasimha Reddy, Facilitating secure communications among multicast nodes in a telecommunications network.
  45. Harikumar, Gopal; Marchok, Daniel J.; Rudofski, Kenneth J., Filter for impulse response shortening with additional spectral constraints for multicarrier transmission.
  46. Chen, Yihsiu; Foladare, Mark Jeffrey; Goldman, Shelley B.; Killian, Thomas Joseph; Schryer, Norman Loren; Stone, Kevin; Weber, Roy Philip, Flexible automated connection to virtual private networks.
  47. Pedersen, Brian Dam; Vendelbo, Allan Munk, Hearing device and method of hearing device communication.
  48. Pedersen, Brian Dam; Vendelbo, Allan Munk, Hearing device and method of updating a hearing device.
  49. Pedersen, Brian Dam; Vendelbo, Allan Munk, Hearing device and method of updating a hearing device.
  50. Pedersen, Brian Dam; Vendelbo, Allan Munk, Hearing device with model control and associated methods.
  51. Pedersen, Brian Dam; Vendelbo, Allan Munk, Hearing device with model control and associated methods.
  52. Pedersen, Brian Dam; Vendelbo, Allan Munk, Hearing device with model control and associated methods.
  53. Park,Sang do, Home gateway for executing a function of a security protocol and a method thereof.
  54. Felsher, David Paul, Information record infrastructure, system and method.
  55. Kunzinger,Charles A., Integrated system for network layer security and fine-grained identity-based access control.
  56. Lim, Chang; Hui, Jimmy K.; Wu, Wendy W. J.; Lee, Timmy W.; Look, Heng M., Internet-enabled service management and authorization system and method.
  57. Lim,Chang; Hui,Jimmy K.; Wu,Wendy W. J.; Lee,Timmy W.; Look,Heng M., Internet-enabled service management and authorization system and method.
  58. Chang Lim CA; Jimmy K. Hui CA; Wendy W. J. Wu CA; Timmy W. Lee CA; Heng M. Look CA, Internet-enabled service management system and method.
  59. Chiroglazov, Anatoli G.; Drenan, Lawrence A., Isolated working chamber associated with a secure inter-company collaboration environment.
  60. Showalter, Wayne; Larson, Alain L., Laboratory instrumentation information management and control network.
  61. Graham,John C., Metered Internet usage.
  62. Bellovin, Steven Michael; Killian, Thomas Joseph; LaRose, Bruce; Rubin, Aviel D.; Schryer, Norman Loren, Method and apparatus for connection to virtual private networks for secure transactions.
  63. Bellovin, Steven Michael; Killian, Thomas Joseph; LaRose, Bruce; Rubin, Aviel D.; Schryer, Norman Loren, Method and apparatus for connection to virtual private networks for secure transactions.
  64. Nadeau, Thomas D.; Koushik, A. S. Kiran, Method and apparatus for controlled access of requests from virtual private network devices to managed information objects using simple network management protocol and multi-topology routing.
  65. St. Pierre,Robert P.; Caronni,Germano, Method and apparatus for conveying a security context in addressing information.
  66. Srivastava, Sunil K.; Trostle, Jonathan; Bell, Raymond; Golla, Ramprasad, Method and apparatus for creating a secure communication channel among multiple event service nodes.
  67. Srivastava,Sunil K.; Trostle,Jonathan; Bell,Raymond; Golla,Ramprasad, Method and apparatus for creating a secure communication channel among multiple event service nodes.
  68. Srivastava, Sunil K., Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure.
  69. Srivastava,Sunil; Trostle,Jonathan; Bell,Raymond; Golla,Ramprasad, Method and apparatus for distributing and updating private keys of multicast group managers using directory replication.
  70. Srivastava,Sunil; Trostle,Jonathan; Bell,Raymond; Golla,Ramprasad, Method and apparatus for distributing and updating private keys of multicast group managers using directory replication.
  71. Kapoor, Samir; Marchok, Daniel J., Method and apparatus for interference suppression in orthogonal frequency division multiplexed (OFDM) wireless communication systems.
  72. Kapoor, Samir; Marchok, Daniel J., Method and apparatus for interference suppression in orthogonal frequency division multiplexed (OFDM) wireless communication systems.
  73. Nadeau,Thomas D.; Francisco,Dale, Method and apparatus providing controlled access of requests from virtual private network devices to managed information objects using simple network management protocol.
  74. Srivastava,Sunil K., Method and apparatus providing secure multicast group communication.
  75. Jones, Bryce A.; Delker, Jason; Everson, John M., Method and system for establishing VPN connections in response to wireless network identifiers.
  76. Caronni, Germano; Gupta, Amit; Markson, Tom R.; Kumar, Sandeep; Schuba, Christoph L.; Scott, Glenn C., Method and system for facilitating relocation of devices on a network.
  77. Jones, Bryce A.; Delker, Jason R. A.; Everson, John M., Method and system for providing multiple connections from a common wireless access point.
  78. Jones,Bryce A.; Delker,Jason R. A.; Everson,John M., Method and system for providing remote telephone service via a wireless local area network.
  79. Jones, Bryce A.; Delker, Jason; Everson, John M., Method and system for selecting VPN connections in response to wireless network identifiers.
  80. Barrett, Michael, Method and system for transmitting authentication context information.
  81. Barrett, Michael, Method and system for transmitting authentication context information.
  82. Barrett, Michael, Method and system for transmitting authentication context information.
  83. Barrett, Michael Richard, Method and system for transmitting authentication context information.
  84. Barrett, Michael Richard, Method and system for transmitting authentication context information.
  85. Barrett,Michael Richard, Method and system for transmitting authentication context information.
  86. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  87. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  88. Larson, Victor; Short, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing encrypted channel.
  89. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  90. Srivastava,Sunil K., Method for overcoming the single point of failure of the central group controller in a binary tree group key exchange approach.
  91. Masaki Hamano JP, Method of communication through leased line in virtual private network.
  92. Vollmer, Vasco; Hofmann, Matthias, Method of controlling access.
  93. Pedersen, Brian Dam; Vendelbo, Allan Munk, Method of manufacturing a hearing device and hearing device with certificate.
  94. Howard, Brett; Robison, Andrew; Pereira, Roy; Kierstead, Paul; Solymar, Gabor, Method of using static maps in a virtual private network.
  95. Timms, Natalie; Fanning, Scott; Wilson, Ian Herbert, Methods and apparatus for virtual private network fault tolerance.
  96. Mulligan, John T.; Knight, David John; Kulper, Ronnie R.; Moloney, Don J.; Nguyen, Mai-Uyen Thi; Nguyen, Han Q.; Toll-Verry, Diana Lynn; Zelingher, Simon S., Methods and apparatus to provision cloud computing network elements.
  97. Mooi Choo Chuah ; Girish Rai, Multi-hop point-to-point protocol.
  98. Hoffberg, Steven M., Multifactorial optimization system and method.
  99. Henderson, P. Michael, Network telephony.
  100. Marchok, Daniel J.; Younce, Richard C.; Melsa, Peter J. W., OFDM/DMT/ digital communications system including partial sequence symbol processing.
  101. Sankaran, Ganesh Chennimalai, Obtaining information on forwarding decisions for a packet flow.
  102. Srivastava,Sunil K., Operational optimization of a shared secret Diffie-Hellman key exchange among broadcast or multicast groups.
  103. Carley, Jeffrey A., Out-of-band remote management station.
  104. Carley,Jeffrey Alan, Out-of-band remote management station.
  105. Cocotis, Thomas A.; Curtis, Alan D.; Emmett, David M.; Fan, Shengkuo; Henderson, Kristofer P.; Luepke, Jack W.; Nellor, Howard J.; Treptow, Jay A.; Wong, Gregory H., Output management system and method for enabling access to private network resources.
  106. Trivedi, Atul Narendra; Malmskog, Steven, Peer discovery and secure communication in failover schemes.
  107. Trivedi, Atul Narendra; Malmskog, Steven A, Peer discovery and secure communication in failover schemes.
  108. Rekhter, Yakov; Rosen, Eric C., Peer-model support for virtual private networks having potentially overlapping addresses.
  109. Rekhter,Yakov; Rosen,Eric C., Peer-model support for virtual private networks having potentially overlapping addresses.
  110. Yakov Rekhter ; Eric C. Rosen, Peer-model support for virtual private networks with potentially overlapping addresses.
  111. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Persistent and reliable session securely traversing network components using an encapsulating protocol.
  112. Srivastava,Sunil K., Processing method for key exchange among broadcast or multicast groups that provides a more efficient substitute for Diffie-Hellman key exchange.
  113. Kumar, Mahesh, Reducing virtual IP-address (VIP) failure detection time.
  114. Eisendrath,Benjamin; Spannbauer,Bradley; Smith, Jr.,Stanley O., Regulating concurrent logins associated with a single account.
  115. Pedersen, Brian Dam; Vendelbo, Allan Munk, Rights management in a hearing device.
  116. Kennelly, Richard J.; Ouellette, Kenneth W., Role based management independent of the hardware topology.
  117. Rekhter,Yakov; Rosen,Eric C., Router for virtual private network employing tag switching.
  118. Toh,Eng Whatt; Wong,Chee Hong; Teo,Kok Hoon; Yip,See Wai, Secure and reliable document delivery.
  119. Toh,Eng Whatt; Teo,Kok Hoon, Secure and reliable document delivery using routing lists.
  120. Drenan,Lawrence A.; George,Samuel; Smith,Ronald Peter; Upadhyay,Deepak P.; Schmidt,Juergen; Werner,Jens; Matzke,Wolf Ekkehard; Ligtenberg,Adriaan, Secure inter-company collaboration environment.
  121. Carley, Jeffrey Alan, Secure management access control for computers, embedded and card embodiment.
  122. Dispensa, Steve, Secure network computing.
  123. Carley, Jeffrey Alan, Secure remote management appliance.
  124. Carley,Jeffrey Alan, Secure remote management appliance.
  125. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay, Secure traversal of network components.
  126. Andrew,Felix G. T. I.; Fortier,Dominique, Selecting an appropriate transfer mechanism for transferring an object.
  127. Rosen,Eric C.; Rekhter,Yakov, Shared communications network employing virtual-private-network identifiers.
  128. Yakov Rekhter ; Eric C. Rosen, Shared communications network employing virtual-private-network identifiers.
  129. Harikumar, Gopal; Marchok, Daniel J., Spectrally constrained impulse shortening filter for a discrete multi-tone receiver.
  130. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  131. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  132. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  133. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  134. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  135. Ludovici, David S.; Melville, Mark J.; Mullock, Richard A.; Paxhia, Frank V., System and method for central management of connections in a virtual private network.
  136. Olsen, Gregory R.; Frost, Hildreth R.; Thirunavukkarasu, Chelliah; Nibbelink, Mitchell W., System and method for creating, executing and maintaining cross-enterprise processes.
  137. Hoffberg, Steven M., System and method for determining contingent relevance.
  138. Caronni, Germano; Gupta, Amit; Kumar, Sandeep; Markson, Tom R.; Schuba, Christoph L.; Scott, Glenn C., System and method for enabling scalable security in a virtual private network.
  139. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing a communication link.
  140. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing an encrypted communication link based on IP address lookup requests.
  141. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  142. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  143. Zimman, Christopher William; Hook, James William; Dulai, Dharmender, System and method for providing secure data transmission.
  144. Allen, Thomas H.; Irwin, Gregg, System and method for providing to multiple user computers concurrent telephonic access to multiple remote devices.
  145. Dispensa, Steve; Miller, Matt; Schroeder, Wayne; Sloderbeck, Jason, System and method for remote network access.
  146. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  147. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  148. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  149. Caronni, Germano; Gupta, Amit; Kulmar, Sandeep; Markson, Tom R.; Schuba, Christoph L.; Scott, Glenn C., System and method for separating addresses from the delivery scheme in a virtual private network.
  150. Caronni, Germano; Gupta, Amit; Kulmar, Sandeep; Markson, Tom R.; Schuba, Christoph L.; Scott, Glenn C., System and method for separating addresses from the delivery scheme in a virtual private network.
  151. Thomas W. Lynch, System and method for supporting multimedia communications upon a dynamically configured member network.
  152. Trivedi, Pooja; Momchilov, Georgy; Pope, David, System and method for transferring data among computing environments.
  153. Trivedi, Pooja; Momchilov, Georgy; Pope, David, System and method for transferring data among computing environments.
  154. Carter, Stephen R.; McClain, Carolyn Bennion; Allen, Jared Patrick; Olds, Dale Robert; Burch, Lloyd Leon; Jose, Jaimon, System and method for transparent cloud access.
  155. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for using a registered name to connect network devices with a link that uses encryption.
  156. Chen, Yihsiu; Foladare, Mark Jeffrey; Goldman, Shelley B.; Killian, Thomas Joseph; Schryer, Norman Loren; Stone, Kevin; Weber, Roy Philip, System for automated connection to virtual private networks related applications.
  157. Maria,Arturo, System for securing inbound and outbound data packet flow in a computer network.
  158. Larson, Victor, Systems and methods for certifying devices to communicate securely.
  159. Larson, Victor, Systems and methods for certifying devices to communicate securely.
  160. Larson, Victor, Systems and methods for certifying devices to communicate securely.
  161. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Systems and methods for connecting network devices over communication network.
  162. Panasyuk,Anatoliy; Kramer,Andre; Pedersen,Bradley Jay; Stone,David Sean; Treder,Terry, Systems and methods for continuing an operation interrupted from a reconnection between a client and server.
  163. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Systems and methods for maintaining a client's network connection thru a change in network identifier.
  164. Panasyuk,Anatoliy; Kramer,Andre; Pedersen,Bradley Jay; Stone,David Sean; Treder,Terry, Systems and methods for maintaining a session between a client and host service.
  165. Indiran, Eric; Green, Brian; Piasecki, Derek, Systems and methods for transferring data between computing devices.
  166. Du, John; Vicente, John, Systems and methods for virtualizing functions and decentralizing service delivery in a flat network of interconnected personal devices.
  167. Du, John; Vicente, John, Systems and methods for virtualizing functions and decentralizing service delivery in a flat network of interconnected personal devices.
  168. Larson, Victor, Third party VPN certification.
  169. Larson, Victor, Third party VPN certification.
  170. Larson, Victor, Third party VPN certification.
  171. Larson, Victor, Third party VPN certification.
  172. Larson, Victor, Third party VPN certification.
  173. Larson,Victor, Third party VPN certification.
  174. Harikumar, Gopal; Marchok, Daniel J.; Rudofski, Kenneth J., Time-domain equalization for discrete multi-tone systems.
  175. Hall ; Jr. George E. ; Kari John D., Virtual client to gateway connection over multiple physical connections.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로