$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for managing a virtual private network

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/30
출원번호 US-0013743 (1998-01-27)
발명자 / 주소
  • Liu Quentin C.
출원인 / 주소
  • VPNet Technologies, Inc.
대리인 / 주소
    Park & Vaughan LLP
인용정보 피인용 횟수 : 285  인용 특허 : 11

초록

The present invention provides a method and an apparatus for managing a virtual private network operating over a public data network. This public data network has been augmented to include a plurality of virtual private network gateways so that communications across the virtual private network are c

대표청구항

[ What is claimed is:] [1.] A method for managing virtual private networks operating over a public data network, the public data network including a plurality of virtual private network gateways so that communications across virtual private networks are channeled through the virtual private network

이 특허에 인용된 특허 (11)

  1. Vu Hung T. (Ottawa CAX), Apparatus and method for providing a secure gateway for communication and data exchanges between networks.
  2. Lautenschlager Wolfgang (Weissach-Flacht DEX), Call-routing method for a virtual private network as well as service computer and exchange therefor.
  3. Wesinger ; Jr. Ralph E. ; Coley Christopher D., Firewall providing enhanced network security and user transparency.
  4. Hardwick Ken (Sherwood OR) Stone Geoffrey C. (Minneapolis MN), Method and apparatus for virtual switching.
  5. Onweller Arthur E., Network addressing scheme encoding communication channel information.
  6. Scholl Thomas H. ; Witowsky William E., Network management gateway.
  7. Dev Roger H. (Durham NH) Emery Dale H. (Berwick ME) Rustici Eric S. (Londonderry NH) Brown Howard M. (Rochester NH) Wiggin Dwayne S. (Rochester NH) Gray Eric W. (Manchester NH) Scott Walter P. (Salem, Network management system using model-based intelligence.
  8. Ahmed Masuma (Middletown NJ) Clark Douglas P. (Middletown NJ) Hayano Shin-ichiro (Kawasaki JPX), System and method for providing egress policing for broadband virtual private networks.
  9. Bell Robert T. (Garland TX) Platt Richard B. (Allen TX), System and method for signalling and call processing for private and hybrid communications systems including multimedia.
  10. Seid Howard A. ; Lespagnol Albert,FRX, Virtual private network.
  11. Ishii Tadao (Kawasaki JPX), Virtual private network connecting system.

이 특허를 인용한 특허 (285)

  1. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  2. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  3. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  4. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  5. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  6. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  7. Larson, Victor; Short, III, Robert; Munger, Edmund; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  8. Larson,Victor; Short, III,Robert Dunham; Munger,Edmund Colby; Williamson,Michael, Agile network protocol for secure communications using secure domain names.
  9. Edmund Colby Munger ; Douglas Charles Schmidt ; Robert Dunham Short, III ; Victor Larson ; Michael Williamson, Agile network protocol for secure communications with assured system availability.
  10. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D., Agile network protocol for secure communications with assured system availability.
  11. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D.; Schmidt, Douglas Charles, Agile network protocol for secure communications with assured system availability.
  12. Munger, Edmund Colby; Schmidt, Douglas Charles; Short, Robert Dunham; Larson, Victor; Williamson, Michael, Agile network protocol for secure communications with assured system availability.
  13. Munger, Edmund; Schmidt, Douglas; Short, III, Robert; Larson, Victor; Williamson, Michael, Agile network protocol for secure communications with assured system availability.
  14. Munger,Edmund Colby; Sabio,Vincent J.; Short, III,Robert Dunham; Gligor,Virgil D.; Schmidt,Douglas Charles, Agile network protocol for secure communications with assured system availability.
  15. Munger,Edmund Colby; Sabio,Vincent J.; Short,Robert Dunham; Gligor,Virgil D.; Schmidt,Douglas Charles, Agile network protocol for secure communications with assured system availability.
  16. Schmidt, Douglas Charles; Short, III, Robert Dunham, Agile network protocol for secure communications with assured system availability.
  17. Munger, Edmund Colby; Schmidt, Douglas Charles; Short, III, Robert Dunham; Larson, Victor; Williamson, Michael, Agile network protocol for secure video communications with assured system availability.
  18. Monaghan, John; Hunter, Donald Iain, Analyzing virtual private network failures.
  19. Marchok, Daniel J.; Kapoor, Samir; Chandran, Ravi, Apparatus and method for clock synchronization in a multi-point OFDM/DMT digital communications system.
  20. Marchok, Daniel J.; Kapoor, Samir; Chandran, Ravi, Apparatus and method for clock synchronization in a multi-point OFDM/DMT digital communications system.
  21. Bowers, John Joseph; Peterson, Matthew T, Apparatus, systems and methods to provide authentication services to a legacy application.
  22. Bots, Henk J.; Hunt, William E.; Palma, Derek; Lawler, John, Architecture for virtual private networks.
  23. Bots,Henk J.; Hunt,William E.; Palma,Derek; Lawler,John, Architecture for virtual private networks.
  24. Jain, Jayant; Sengupta, Anirban; Nimmagadda, Srinivas; Tiagi, Alok S.; Kumar, Kausum, Associating service tags with remote data message flows based on remote device management attributes.
  25. Markham,Thomas R.; Bogle,Jessica J.; Payne, Jr.,Charles N., Associative policy model.
  26. Collins, Gregory Paul, Automated network testing platform.
  27. Poisson, Matthew W.; Desroches, Melissa L.; Milillo, James M., Bulk configuring a virtual private network.
  28. Robinson, Kyle Lane; Bowers, John Joseph, Centralized user authentication system apparatus and method.
  29. Robinson, Kyle Lane; Bowers, John Joseph, Centralized user authentication system apparatus and method.
  30. Caronni, Germano; Gupta, Amit; Markson, Tom R.; Kumar, Sandeep; Schuba, Christoph L.; Scott, Glenn C., Channel-specific file system views in a private network using a public-network infrastructure.
  31. Xu, Qing, Cloud-based security policy configuration.
  32. Xu, Qing, Cloud-based security policy configuration.
  33. Schurig,Alma K., Combination power and full duplex data cable.
  34. Acharya, Yatin, Combining VLAN tagging with other network protocols allows a user to transfer data on a network with enhanced security.
  35. Maxwell, David John; Duncan, Robert; Urouhart, Steven James; Moran, Mike, Configuration of VPNs.
  36. Lee, Chi-Feng; Ho, Ming-Chin, Data transmission management server and method.
  37. Caronni,Germano; Gupta,Amit; Markson,Tom R.; Kumar,Sandeep; Schuba,Christoph L.; Scott,Glenn C., Decoupling access control from key management in a network.
  38. Jain, Jayant; Sengupta, Anirban; Nimmagadda, Srinivas; Tiagi, Alok S.; Kumar, Kausum, Defining network rules based on remote device management attributes.
  39. Donzis, Lewis T.; Hughes, Earnest E.; Matelske, Ryan M.; Baron, Peter W., Detecting if a secure link is alive.
  40. Maufer,Thomas Albert; Nanda,Sameer; Sidenblad,Paul J., Detection of support for security protocol and address translation integration.
  41. Tapie, Thierry; Defrance, Serge; Lubbers, Willem, Device for generating a sampled ramp signal representative of a synchronization signal, and device for assisting the reconstruction of a synchronization signal, for a packet switching network.
  42. Peterson, Matthew T.; Webb, Jeff Marsden, Disconnected credential validation using pre-fetched service tickets.
  43. Peterson, Matthew T.; Webb, Jeff Marsden, Disconnected credential validation using pre-fetched service tickets.
  44. Jain, Jayant; Sengupta, Anirban; Nimmagadda, Srinivas; Tiagi, Alok S.; Kumar, Kausum, Distributed VPN gateway for processing remote device management attribute based rules.
  45. Markham, Thomas R., Distributed firewall system and method.
  46. Pillai,Vikram; Kinsella,Joseph; Bray,Patrick; White,Noah; MacCallum,Deborah; Klotz,Robert; Bruell,Gregory O., Distributed network monitoring and control system.
  47. Perry,James R.; Snow,Kevin D.; Black,Darryl, Distributed user management information in telecommunications networks.
  48. Jain, Jayant; Sengupta, Anirban; Nimmagadda, Srinivas; Tiagi, Alok S.; Kumar, Kausum, Distributing remote device management attributes to service nodes for service rule processing.
  49. Young, Charles K.; White, Terrence E.; Diggs, Melanie R.; Colar, Gerald D., Dynamic virtual private network.
  50. Brandwine, Eric Jason; Miller, Kevin Christopher; Doane, Andrew J., Emulating virtual router device functionality in virtual computer networks.
  51. Shigapov, Andrey; Koval, Alexander, Enabling a virtual meeting room through a firewall on a network.
  52. Leung,Kent K.; Dommety,Gopal, Enabling services for multiple sessions using a single mobile node.
  53. Matoba, Kazumine, Encryption communication system.
  54. Cheswick, William, End user circuit diversity auditing methods.
  55. McGrew, David; Weis, Brian; Wainner, W. Scott, Enforcing the principle of least privilege for large tunnel-less VPNs.
  56. Kunzinger, Charles A., Establishing consistent, end-to-end protection for a user datagram.
  57. Munger,Edward Colby; Short, III,Robert Dunham; Larson,Victor; Williamson,Michael, Establishment of a secure communication link based on a domain name service (DNS) request.
  58. Liam M. Casey CA, Extended internet protocol virtual private network architectures.
  59. Harikumar, Gopal; Marchok, Daniel J.; Rudofski, Kenneth J., Filter for impulse response shortening with additional spectral constraints for multicarrier transmission.
  60. Chen, Yihsiu; Foladare, Mark Jeffrey; Goldman, Shelley B.; Killian, Thomas Joseph; Schryer, Norman Loren; Stone, Kevin; Weber, Roy Philip, Flexible automated connection to virtual private networks.
  61. Michael C. Finley ; Aaron Bilger ; John Paul Desetto ; Michael Dudgeon ; James Lee Fortuna ; Allen Ivester ; Jason Thomas Pastor ; Todd Shollenberger ; Gregory S. Tinney ; John Wade, Fuel dispensing home phone network alliance (home PNA) based system.
  62. Ishikawa, Akira; Niki, Teruki; Mitoh, Takashi; Ueda, Masaomi; Hino, Tetsuya, Gateway apparatus and the method thereof.
  63. Kim,Jun hyeong, Gateway for supporting communications between network devices of different private networks.
  64. Loveland,Shawn Domenic, Granular authorization for network user sessions.
  65. Huang Peter Sung-An ; Horvath Joseph K. ; Braud ; II Rock N., Graphic user interface system for a telecommunications switch management system.
  66. Taylor,David T.; Caron,Jonathan P.; Bosa,Patrick A., Help desk systems and methods for use with communications networks.
  67. Andrews, Jock; Miller, Craig A.; Anderson, Keith R.; Christensen, Richard H.; Pugina, Marcio; Veech, Jason S.; Peppin, Kevin J.; Erdman, Larry G., High-speed network of independently linked nodes.
  68. Park,Sang do, Home gateway for executing a function of a security protocol and a method thereof.
  69. Mark E. Millet ; Chi-Shing Ng, IP network for accomodating mobile users with incompatible network addressing.
  70. Millet, Mark E.; Ng, Chi-Shing, IP network for accomodating mobile users with incompatible network addressing.
  71. Vanyukhin, Nikolay; Shevnin, Oleg; Korotich, Alexey, Identity migration apparatus and method.
  72. Vanyukhin, Nikolay; Shevnin, Oleg; Korotich, Alexey, Identity migration apparatus and method.
  73. Felsher, David Paul, Information record infrastructure, system and method.
  74. Haeffele, Steven M.; Gupta, Ramesh M.; Raman, Ananth; Vissamsetti, Srikant, Integrated firewall, IPS, and virus scanner system and method.
  75. Haeffele, Steven M.; Gupta, Ramesh M.; Raman, Ananth; Vissamsetti, Srikant, Integrated firewall, IPS, and virus scanner system and method.
  76. Gonda, Rohinton S.; Shu, Nin Kin; Vangala, Ramalingeswara R., Integrated network and service management with automated flow through configuration and provisioning of virtual private networks.
  77. Ishizaki, Takeshi; Miyake, Shigeru, Integrated service management system.
  78. Ishizaki,Takeshi; Miyake,Shigeru, Integrated service management system.
  79. Ishizaki,Takeshi; Miyake,Shigeru, Integrated service management system.
  80. Ishizaki,Takeshi; Miyake,Shigeru; Yamamoto,Hideyuki; Otani,Koichiro, Integrated service management system for remote customer support.
  81. Ishizaki,Takeshi; Miyake,Shigeru; Yamamoto,Hideyuki; Otani,Koichiro, Integrated service management system for remote customer support.
  82. Kunzinger,Charles A., Integrated system for network layer security and fine-grained identity-based access control.
  83. Wang,Huizhao, Inter-proxy communication protocol for mobile IP.
  84. Casey Liam M.,CAX ; Cunningham Ian M.,CAX ; Eros Robert W.,CAX, Internet protocol virtual private network realization using multi-protocol label switching tunnels.
  85. Lim, Chang; Hui, Jimmy K.; Wu, Wendy W. J.; Lee, Timmy W.; Look, Heng M., Internet-enabled service management and authorization system and method.
  86. Lim,Chang; Hui,Jimmy K.; Wu,Wendy W. J.; Lee,Timmy W.; Look,Heng M., Internet-enabled service management and authorization system and method.
  87. Chang Lim CA; Jimmy K. Hui CA; Wendy W. J. Wu CA; Timmy W. Lee CA; Heng M. Look CA, Internet-enabled service management system and method.
  88. Jardin,Cary A.; Varsanyi,Eric; Duclos,Phil J.; Padua,Vincent M., Link-lock device and method of monitoring and controlling a link for failures and intrusions.
  89. Poisson, Matthew W.; Desroches, Melissa L.; Milillo, James M., Managing a virtual private network.
  90. Underwood,Roy Aaron, Managing user information on an e-commerce system.
  91. Schurig, Alma K.; Anderson, Keith R.; Chang, Guy; Erdmann, Larry G., Method and apparatus for an environmentally hardened ethernet network system.
  92. Oikonomou, Kostas; Sinha, Rakesh K., Method and apparatus for computing the cost of providing VPN service.
  93. Bellovin, Steven Michael; Killian, Thomas Joseph; LaRose, Bruce; Rubin, Aviel D.; Schryer, Norman Loren, Method and apparatus for connection to virtual private networks for secure transactions.
  94. Bellovin, Steven Michael; Killian, Thomas Joseph; LaRose, Bruce; Rubin, Aviel D.; Schryer, Norman Loren, Method and apparatus for connection to virtual private networks for secure transactions.
  95. Gupta, Ramesh M.; Jain, Parveen K.; Amidon, Keith E.; Gong, Fengmin; Vissamsetti, Srikant; Haeffele, Steve M.; Raman, Ananth, Method and apparatus for detecting intrusions on a computer system.
  96. Mukherjee,Sarit; Paul,Sanjoy, Method and apparatus for enabling peer-to-peer virtual private network (P2P-VPN) services in VPN-enabled network.
  97. Kapoor, Samir; Marchok, Daniel J., Method and apparatus for interference suppression in orthogonal frequency division multiplexed (OFDM) wireless communication systems.
  98. Kapoor, Samir; Marchok, Daniel J., Method and apparatus for interference suppression in orthogonal frequency division multiplexed (OFDM) wireless communication systems.
  99. Hoke, Mark R.; Arrow, Leslie J., Method and apparatus for processing communications in a virtual private network.
  100. Elley, Yassir K.; Anderson, Anne H.; Hanna, Stephen R.; Mullan, Sean J.; Perlman, Radia J., Method and system for dynamic issuance of group certificates.
  101. Caronni, Germano; Gupta, Amit; Markson, Tom R.; Kumar, Sandeep; Schuba, Christoph L.; Scott, Glenn C., Method and system for facilitating relocation of devices on a network.
  102. Elley,Yassir K.; Anderson,Anne H.; Hanna,Stephen R.; Mullan,Sean J.; Perlman,Radia J., Method and system for proving membership in a nested group using chains of credentials.
  103. Balissat, Joel; Galand, Claude; Le Pennec, Jean Francois; Sommerlatt, Jean Marie, Method and system for securely scanning network traffic.
  104. Balissat, Joel; Galand, Claude; Le Pennec, Jean-Francois; Sommerlatt, Jean-Marie, Method and system for securely scanning network traffic.
  105. Balissat,Joel; Galand,Claude; Le Pennec,Jean Francois; Sommerlatt,Jean Marie, Method and system for securely scanning network traffic.
  106. Lawrence,Jeremy, Method and system to provide secure in-band management for a packet data network.
  107. Elley,Yassir K.; Anderson,Anne H.; Hanna,Stephen R.; Mullan,Sean J.; Perlman,Radia Joy, Method ans system for pro-active credential refreshing.
  108. Wing,Julie; Shomo,Rob; Graves,David; Madhavan,Sajeev, Method for deploying a virtual private network.
  109. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  110. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  111. Larson, Victor; Short, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing encrypted channel.
  112. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  113. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  114. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  115. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  116. Larson,Victor; Short, III,Robert Durham; Munger,Edmund Colby; Williamson,Michael, Method for establishing secure communication link between computers of virtual private network.
  117. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network without user entering any cryptographic information.
  118. Kang,Ning; Liu,Liang; Gao,Shengqiang; Guo,Xinhua, Method for implementing the reconstruction of an optical network.
  119. Smith, Wallace Eric; West, William B.; McDaniel, Steven R., Methods and apparatus for providing high speed connectivity to a hotel environment.
  120. Smith, Wallace Eric; West, William B.; McDaniel, Steven R., Methods and apparatus for providing high speed connectivity to a hotel environment.
  121. Smith, Wallace Eric; West, William B.; McDaniel, Steven R., Methods and apparatus for providing high speed connectivity to a hotel environment.
  122. Smith, Wallace Eric; West, William B.; McDaniel, Steven R., Methods and apparatus for providing high speed connectivity to a hotel environment.
  123. Bernier, Mark; Rochefort, Dany J.; Volpe, Victor; Bolinger, Christopher R.; Nassar, Nizar; Tardif, Marc, Methods and apparatus for providing security to a computerized device.
  124. Dutertre,Bruno, Methods and apparatus for scalable distributed management of wireless virtual private networks.
  125. Stringer Calvert,David W. J.; Dawson,Steven Mark; Lincoln,Patrick D., Methods and apparatus for scalable, distributed management of virtual private networks.
  126. Leung,Kent K.; Dommety,Gopal, Methods and apparatus for securing proxy Mobile IP.
  127. Leung, Kent K.; Dommety, Gopal, Methods and apparatus for securing proxy mobile IP.
  128. Dommety,Gopal; Siddiqi,Waseem; Leung,Kent, Methods and apparatus for supporting mobile IP proxy registration in a system implementing mulitple VLANs.
  129. Wang, Huizhao; Leung, Kent K.; Siddiqi, Waseem A.; Andiazabal, Christine, Methods and apparatus for supporting proxy mobile IP registration in a wireless local area network.
  130. Wang,Huizhao; Leung,Kent K.; Siddiqi,Waseem A.; Andiazabal,Christine, Methods and apparatus for supporting proxy mobile IP registration in a wireless local area network.
  131. Siddiqi,Waseem A.; Thippeswamy,Arunkumar B.; Yu,Tai Y., Methods and apparatus for synchronizing subnet mapping tables.
  132. Leung,Keng; Patel,Alpesh S., Methods and apparatus for virtual private network based mobility.
  133. Leung,Keng; Patel,Alpesh S., Methods and apparatus for virtual private network based mobility.
  134. Timms, Natalie; Fanning, Scott; Wilson, Ian Herbert, Methods and apparatus for virtual private network fault tolerance.
  135. Van Der Merwe, Jacobus; Gerber, Alexandre; Ramakrishnan, Kadangode, Methods and apparatus to communicatively couple virtual private networks to virtual machines within distributive computing networks.
  136. Baliga, Arati; Chen, Xu; Coskun, Baris; de los Reyes, Gustavo; Lee, Seungjoon; Mathur, Suhas; Van der Merwe, Jacobus; Xu, Gang, Methods and apparatus to configure virtual private mobile networks for security.
  137. Baliga, Arati; Chen, Xu; Coskun, Baris; de los Reyes, Gustavo; Lee, Seungjoon; Mathur, Suhas; Van der Merwe, Jacobus; Xu, Gang, Methods and apparatus to configure virtual private mobile networks for security.
  138. Van der Merwe, Jacobus; Chen, Xu; Coskun, Baris; de los Reyes, Gustavo; Lee, Seungjoon; Mathur, Suhas; Baliga, Arati; Xu, Gang, Methods and apparatus to configure virtual private mobile networks to reduce latency.
  139. Van der Merwe, Jacobus; Baliga, Arati; Chen, Xu; Coskun, Baris; de los Reyes, Gustavo; Lee, Seungjoon; Mathur, Suhas; Xu, Gang, Methods and apparatus to configure virtual private mobile networks with virtual private networks.
  140. Gerber, Alexandre; Lund, Carsten; Van der Merwe, Jacobus; Satterlee, Michael, Methods and apparatus to dynamically control access from virtual private networks to network-based shared resources.
  141. Satterlee, Michael; Shackleton, Neal; Gibbons, John F., Methods and apparatus to dynamically control connectivity within virtual private networks.
  142. Satterlee, Michael; Shackleton, Neal; Gibbons, John F., Methods and apparatus to dynamically control connectivity within virtual private networks.
  143. Satterlee, Michael; Shackleton, Neal; Gibbons, John F., Methods and apparatus to dynamically control connectivity within virtual private networks.
  144. Satterlee, Michael; Shackleton, Neal; Gibbons, John F., Methods and apparatus to dynamically control connectivity within virtual private networks.
  145. Ramakrishnan, Kadangode K.; Van Der Merwe, Jacobus; Shenoy, Prashant; Wood, Timothy, Methods and apparatus to migrate virtual machines between distributive computing networks across a wide area network.
  146. Ramakrishnan, Kadangode K.; Van der Merwe, Jacobus E.; Shenoy, Prashant; Wood, Timothy, Methods and apparatus to migrate virtual machines between distributive computing networks across a wide area network.
  147. Poisson,Matthew W.; Desroches,Melissa L.; Milillo,James M.; Subbarao,Ravi, Monitoring a virtual private network.
  148. Molen, Brett Thomas; Norr, George B.; Welch, John Thomas; Ehlers, Richard L.; Midani, Wael R., Monitoring and reporting policy compliance of home networks.
  149. Jamieson,Dwight D.; Jamoussi,Bilel N.; Beaubien,Paul J.; Wright,Gregory V., Multi-protocol label switching virtual private networks.
  150. Hoffberg, Steven M., Multifactorial optimization system and method.
  151. Balissat, Joel; Galand, Claude; Le Pennec, Jean Francois; Sommerlatt, Jean Marie, Multipoint server for providing secure, scaleable connections between a plurality of network devices.
  152. Murray,Richard; Hudson,Nick, Network communication system including a database of codes and corresponding telephone numbers.
  153. Koops, Mark; Gonguet, Arnaud; Poupel, Olivier, Network management system for managing networks and implementing services on the networks using rules and an inference engine.
  154. Henderson, P. Michael, Network telephony.
  155. Banks, David; Malavalli, Kumar; Ramsay, Paul; Teow, Kha Sin; Zhu, Jieming, Node device cooperating with switch which implements zones in a fibre channel system.
  156. Banks, David; Malavalli, Kumar; Ramsay, Paul; Teow, Kha Sin; Zhu, Jieming, Node device cooperating with switch which implements zones in a fibre channel system.
  157. Marchok, Daniel J.; Younce, Richard C.; Melsa, Peter J. W., OFDM/DMT/ digital communications system including partial sequence symbol processing.
  158. Carley, Jeffrey A., Out-of-band remote management station.
  159. Carley,Jeffrey Alan, Out-of-band remote management station.
  160. Schmidt,Peter H.; White,Peter J.; Tuttle,David B.; Foulger,Davis; Mellor,Arthur, PC configuration fault analysis.
  161. Anderson, Keith R., Packet prioritization protocol for a large-scale, high speed computer network.
  162. Oguchi,Naoki, Packet relaying apparatus and relaying method with next relaying address collation.
  163. Jain, Jayant; Sengupta, Anirban; Nimmagadda, Srinivas; Tiagi, Alok S.; Kumar, Kausum, Performing logical segmentation based on remote device attributes.
  164. Kwok, Leung Tao; Shah, Sulay; Newell, Craig; Rykowski, Adam; Kommireddy, Sridhar; Singh, Utkarsh; Date, Sagar; Kumar, Kausum; Sengupta, Anirban; Nimmagadda, Srinivas; Jain, Jayant; Masurekar, Uday; Chamarajnagar, Ravishankar, Performing source network address translation based on remote device management attributes.
  165. Munger, Edmund Colby; Schmidt, Douglas Charles; Short, III, Robert Dunham; Larson, Victor, Preventing packet flooding of a computer on a computer network.
  166. Anderson, Keith R., Prioritizing data transmissions using the number of associated origin addresses.
  167. Herve Le Goff DE; Norbert Haertelt DE; Markus Hies DE; Helmut Oberheim DE; Michael Schambach DE, Process and apparatus for the operation of virtual private networks on a common data packet communication network.
  168. Brandwine, Eric Jason; Miller, Kevin Christopher; Doane, Andrew J., Providing virtual networking device functionality for managed computer networks.
  169. Gbadegesin, Abolade; Goertzel, Mario C.; Showman, Kenneth A.; Dunn, Joshua W., Public network distribution of software updates.
  170. Gbadegesin, Abolade; Goertzel, Mario C.; Showman, Kenneth A.; Dunn, Joshua W., Public network distribution of software updates.
  171. Caunter, Mark Leslie; Jackson, Bruce Kelly; Geach, Steven, Remote selection and authorization of collected media transmission.
  172. Caunter, Mark Leslie; Jackson, Bruce Kelly; Geach, Steven, Remote selection and authorization of collected media transmission.
  173. Ould Brahim,Hamid; Fedyk,Donald, Resource allocation using an auto-discovery mechanism for provider-provisioned layer-2 and layer-3 virtual private networks.
  174. Wang, Guide, Safe input browser, operation method thereof, and computer system having the safe input browser.
  175. Toh,Eng Whatt; Wong,Chee Hong; Teo,Kok Hoon; Yip,See Wai, Secure and reliable document delivery.
  176. Toh,Eng Whatt; Teo,Kok Hoon, Secure and reliable document delivery using routing lists.
  177. Underwood, Roy Aaron, Secure gateway interconnection in an e-commerce based environment.
  178. Carley, Jeffrey Alan, Secure management access control for computers, embedded and card embodiment.
  179. Carley, Jeffrey Alan, Secure remote management appliance.
  180. Carley,Jeffrey Alan, Secure remote management appliance.
  181. Ackerman,Mark D.; Ebrahimi,Hashem Mohammad; Amin,Baber, Secure transparent virtual private networks.
  182. Yarborough,William Jordan, Secured FTP architecture.
  183. Orman,Hilarie K., Security context sharing.
  184. Tan, Pek Yew; Cheng, Hong; Tan, Chee Bing, Service in WLAN inter-working, address management system, and method.
  185. Tan, Pek Yew; Cheng, Hong; Tan, Chee Bing, Service in WLAN inter-working, address management system, and method.
  186. Tan, Pek-Yew; Cheng, Hong; Tan, Chee Bing, Service in WLAN inter-working, address management system, and method.
  187. Tan, Pek-Yew; Cheng, Hong; Tan, Chee Bing, Service in WLAN inter-working, address management system, and method.
  188. Nimmagadda, Srinivas; Jain, Jayant; Sengupta, Anirban; Manuguri, Subrahmanyam; Tiagi, Alok S., Service rule console for creating, viewing and updating template based service rules.
  189. Ghostine, Peter E.; McDonald, Michael, Single sign-on system for shared resource environments.
  190. Ghostine, Peter E.; McDonald, Michael, Single sign-on system for shared resource environments.
  191. Harikumar, Gopal; Marchok, Daniel J., Spectrally constrained impulse shortening filter for a discrete multi-tone receiver.
  192. Randle, William M.; Orkis, Randall E., Standardized transmission and exchange of data with security and non-repudiation functions.
  193. Natarajan, Sureshkumar; Liu, Albert, SyncML based OMA connectivity object to provision VPN connections.
  194. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  195. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  196. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  197. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  198. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  199. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  200. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  201. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  202. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  203. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  204. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  205. Ludovici, David S.; Melville, Mark J.; Mullock, Richard A.; Paxhia, Frank V., System and method for central management of connections in a virtual private network.
  206. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for computer security.
  207. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for computer security.
  208. Lyle,Michael P.; Ross,Robert F.; Maricondo,James R., System and method for computer security.
  209. Hoffberg, Steven M., System and method for determining contingent relevance.
  210. Caronni, Germano; Gupta, Amit; Kumar, Sandeep; Markson, Tom R.; Schuba, Christoph L.; Scott, Glenn C., System and method for enabling scalable security in a virtual private network.
  211. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing a communication link.
  212. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing an encrypted communication link based on IP address lookup requests.
  213. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for generating fictitious content for a computer.
  214. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  215. Whittle,Bryan; Tesink,Kaj, System and method for interconnecting multiple virtual private networks.
  216. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for preventing detection of a selected process running on a computer.
  217. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  218. Geist, Joshua B., System and method for providing data and application continuity in a computer system.
  219. Geist, Joshua B., System and method for providing data and application continuity in a computer system.
  220. Geist, Joshua B., System and method for providing data and application continuity in a computer system.
  221. Hanzlik, Robert Otto; Lowe, Geoffrey A.; Markham, Thomas R.; Meredith, Lynn Marquette, System and method for secure group communications.
  222. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  223. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  224. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  225. Caronni, Germano; Gupta, Amit; Kulmar, Sandeep; Markson, Tom R.; Schuba, Christoph L.; Scott, Glenn C., System and method for separating addresses from the delivery scheme in a virtual private network.
  226. Caronni, Germano; Gupta, Amit; Kulmar, Sandeep; Markson, Tom R.; Schuba, Christoph L.; Scott, Glenn C., System and method for separating addresses from the delivery scheme in a virtual private network.
  227. Markham,Thomas R.; Meredith,Lynn Marquette; Hanzlik,Robert Otto; Lowe,Geoffrey A., System and method for transmitting and receiving secure data in a virtual private group.
  228. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for using a registered name to connect network devices with a link that uses encryption.
  229. Moran, Douglas B., System and method for using timestamps to detect attacks.
  230. Cunningham, Sean, System and method to communicate sensitive information via one or more untrusted intermediate nodes with resilience to disconnected network topology.
  231. Chen, Yihsiu; Foladare, Mark Jeffrey; Goldman, Shelley B.; Killian, Thomas Joseph; Schryer, Norman Loren; Stone, Kevin; Weber, Roy Philip, System for automated connection to virtual private networks related applications.
  232. McDysan, David E., System, method and apparatus that employ virtual private networks to resist IP QoS denial of service attacks.
  233. McDysan, David E., System, method and apparatus that isolate virtual private network (VPN) and best effort traffic to resist denial of service attacks.
  234. McDysan, David E., System, method and apparatus that isolate virtual private network (VPN) and best effort traffic to resist denial of service attacks.
  235. Rochford, Suzanne L.; Giles, David P; Morris, Michele E., System, method and graphical user interface for building virtual private networks.
  236. Fatula, Jr., Joseph J., System, method and program for determining a network path by which to send a message.
  237. Smith,Robert Douglas; Wobst,Olaf Alexander, Systems and methods for automatically configuring and managing network devices and virtual private networks.
  238. Smith, Robert Douglas; Wobst, Olaf Alexander, Systems and methods for automatically reconfiguring virtual private networks.
  239. Larson, Victor, Systems and methods for certifying devices to communicate securely.
  240. Larson, Victor, Systems and methods for certifying devices to communicate securely.
  241. Larson, Victor, Systems and methods for certifying devices to communicate securely.
  242. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Systems and methods for connecting network devices over communication network.
  243. Ball, Scott; Greenwald, Joseph; Buia, Christopher; Taylor, David K.; Caron, Jonathan P.; He, Jun, Systems and methods for constructing multi-layer topological models of computer networks.
  244. Greenwald,Joseph; Ball,Scott; Buia,Christopher; Caron,Jonathan P.; Taylor,David K., Systems and methods for diagnosing faults in computer networks.
  245. Bosa,Patrick A.; Greenwald,Joseph; Buia,Christopher; Pantelis,Thomas S.; Ball,Scott, Systems and methods for isolating faults in computer networks.
  246. Buia,Christopher A.; Pantelis,Thomas S.; Taylor,David K.; Ball,Scott; Rockwell,Nathaniel J., Systems and methods for managing and analyzing faults in computer networks.
  247. Peterson, Matthew T.; Peterson, Daniel F., Systems and methods for managing policies on a computer.
  248. Peterson, Matthew T.; Peterson, Daniel F., Systems and methods for managing policies on a computer.
  249. Peterson, Matthew T.; Peterson, Daniel F., Systems and methods for managing policies on a computer.
  250. Peterson, Matthew T.; Peterson, Daniel F., Systems and methods for managing policies on a computer.
  251. Milligan, Thomas; Eastham, Bryant, Systems and methods for providing secure access to embedded devices using a trust manager and a security broker.
  252. Smith, Robert Douglas; Wobst, Olaf Alexander, Systems and methods for remotely maintaining virtual private networks.
  253. Larson, Victor, Third party VPN certification.
  254. Larson, Victor, Third party VPN certification.
  255. Larson, Victor, Third party VPN certification.
  256. Larson, Victor, Third party VPN certification.
  257. Larson, Victor, Third party VPN certification.
  258. Larson,Victor, Third party VPN certification.
  259. Harikumar, Gopal; Marchok, Daniel J.; Rudofski, Kenneth J., Time-domain equalization for discrete multi-tone systems.
  260. Miller, Kevin Christopher; Brandwine, Eric Jason; Doane, Andrew J., Using virtual networking devices and routing information to associate network addresses with computing nodes.
  261. Miller, Kevin Christopher; Brandwine, Eric Jason; Doane, Andrew J., Using virtual networking devices and routing information to associate network addresses with computing nodes.
  262. Miller, Kevin Christopher; Brandwine, Eric Jason; Doane, Andrew J., Using virtual networking devices and routing information to initiate external actions.
  263. Miller, Kevin Christopher; Brandwine, Eric Jason; Doane, Andrew J., Using virtual networking devices and routing information to initiate external actions.
  264. Miller, Kevin Christopher; Brandwine, Eric Jason; Doane, Andrew J., Using virtual networking devices to connect managed computer networks.
  265. Miller, Kevin Christopher; Brandwine, Eric Jason; Doane, Andrew J., Using virtual networking devices to connect managed computer networks.
  266. Miller, Kevin Christopher; Brandwine, Eric Jason; Doane, Andrew J., Using virtual networking devices to connect managed computer networks.
  267. Miller, Kevin Christopher; Brandwine, Eric Jason; Doane, Andrew J., Using virtual networking devices to manage network configuration.
  268. Miller, Kevin Christopher; Brandwine, Eric Jason; Doane, Andrew J., Using virtual networking devices to manage network configuration.
  269. Miller, Kevin Christopher; Brandwine, Eric Jason; Doane, Andrew J., Using virtual networking devices to manage network configuration.
  270. Miller, Kevin Christopher; Brandwine, Eric Jason; Doane, Andrew J., Using virtual networking devices to manage routing communications between connected computer networks.
  271. Miller, Kevin Christopher; Brandwine, Eric Jason; Doane, Andrew J., Using virtual networking devices to manage routing communications between connected computer networks.
  272. Miller, Kevin Christopher; Brandwine, Eric Jason; Doane, Andrew J., Using virtual networking devices to manage routing communications between connected computer networks.
  273. Miller, Kevin Christopher; Brandwine, Eric Jason; Doane, Andrew J., Using virtual networking devices to manage routing cost information.
  274. Miller, Kevin Christopher; Brandwine, Eric Jason; Doane, Andrew J., Using virtual networking devices to manage routing cost information.
  275. Miller, Kevin Christopher; Brandwine, Eric Jason; Doane, Andrew J., Using virtual networking devices to manage routing cost information.
  276. Miller, Kevin Christopher; Brandwine, Eric Jason; Doane, Andrew J., Using virtual networking devices to manage routing information.
  277. Brown,Wendell D., Virtual call center.
  278. McDysan, David E., Virtual private network (VPN)-aware customer premises equipment (CPE) edge router.
  279. McDysan,David E., Virtual private network (VPN)-aware customer premises equipment (CPE) edge router.
  280. Daude, Olivier; Fieschi, Jacques; Galand, Claude; Hericourt, Olivier; Le Pennec, Jean Francois, Virtual private network crossovers based on certificates.
  281. Jalava, Mika, Virtual private network management.
  282. Poisson, Matthew W.; Desroches, Melissa L.; Milillo, James M., Virtual private network manager GUI with links for use in configuring a virtual private network.
  283. Clayton,Tom; Rakes,Richard Bruce, Virtual private network software system.
  284. Cheng, Pau-Chen; D'Sa, Ajit Clarence; Feng, Jian Hua; Genty, Denise Marie; Wilson, Jacqueline Hegedus, Virtual private network with multiple tunnels associated with one group name.
  285. Porcari,Damian, Web-based document system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트