$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Secure intranet access 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
  • G06F-013/38
출원번호 US-0268795 (1999-03-16)
발명자 / 주소
  • Subramaniam Anand
  • Ebrahimi Hashem M.
출원인 / 주소
  • Novell, Inc.
대리인 / 주소
    Computer Law++
인용정보 피인용 횟수 : 406  인용 특허 : 16

초록

Methods, signals, devices, and systems are provided for secure access to a network from an external client. Requests for access to confidential data may be redirected from a target server to a border server, after which a secure sockets layer connection between the border server and the external cli

대표청구항

[ What is claimed and desired to be secured by patent is:] [1.] A distributed computing system allowing secure external access to a secure network, the system comprising:a target server within the secure network;a border server within the secure network, the border server connectable to the target s

이 특허에 인용된 특허 (16)

  1. Blumer Thomas P. ; Stefanik Theodore, Computer system and computer-implemented method for interpreting hypertext links in a document when including the docu.
  2. Murakami Tatsuya (Tachikawa JPX) Hadano Eiichi (Yokohama JPX) Kodama Kazuyuki (Fujisawa JPX) Fujinawa Masaaki (Kanagawa-ken JPX) Iwaki Sunao (Chigasaki JPX), Data processor and data transfer method.
  3. Leone Paul Thomas ; Lumsden Mark Williams ; Pulizzi Victor Edward, Dynamic hypertext link converter system and process.
  4. Kremen Gary ; Kunzelman Kevin Scott ; Ong Peng Tsin ; Fraize Scott M. ; Shah Piyush Bansidhar, Integrated request-response system and method generating responses to request objects formatted according to various co.
  5. Heath David M. (Nashua NH) Kraley Michael F. (Lexington MA) Pant Sangam (Winchester MA), Management facility for server entry and application utilization in a multi-node server configuration.
  6. Nessett Dan M. ; Callsen Christian J. ; Cavanaugh ; III Ken M., Mechanism for locating objects in a secure fashion.
  7. Higley DeeAnne Barker ; Thorne Bruce Warner ; Jarvis Brian Lee, Method and apparatus for proxy authentication.
  8. Chiu Suet Mui ; Dockter Michael Jon ; Farber Joel Frank ; Pauser Michael Leon ; Richardt Randal James, Method for creating a hypertext language for a distributed computer network.
  9. Friedman Aharon ; Levy Ben Zion, Network security device which performs MAC address translation without affecting the IP address.
  10. Elgamal Taher ; Hickman Kipp E.B., Secure socket layer application program apparatus and method.
  11. Birrell Andrew D. ; Wobber Edward P. ; Abadi Martin ; Stata Raymond P., Secure web tunnel.
  12. Gelb Edward J. (Wayne NJ), Security system for preventing unauthorized communications between networks by translating communications received in ip.
  13. Pepe David Mathew (Middletown NJ) Blitzer Lisa B. (Manalapan NJ) Brockman James Joseph (Perrineville NJ) Cruz William (Eatontown NJ) Hakim Dwight Omar (Matawan NJ) Hovey Richard Reid (Somerville NJ) , System and method for providing protocol translation and filtering to access the world wide web from wireless or low-ban.
  14. Logan James ; Carroll Derek V. ; Call Charles G., Techniques for changing the behavior of a link in a hypertext document.
  15. Shapiro Mark L. ; Subramaniam Anand ; Muthumavadi Muthukumar, User name authentication for gateway clients accessing a proxy cache server.
  16. Seid Howard A. ; Lespagnol Albert,FRX, Virtual private network.

이 특허를 인용한 특허 (406)

  1. Zimler,Randy; Hicks,Al, API tool-set for providing services through a residential communication gateway.
  2. Srinivasan, Suresh; Shukla, Amitabh, Access of elements for a secure web page through a non-secure channel.
  3. Magner, Kathryn A.; Mahoney, Laurie; Smith, Shelley; McGiffin, Gail E.; MacIntosh, Kevin W.; Kauderer, Steven I., Activity based costing underwriting tool.
  4. Onyon, Richard; Stannard, Liam; Ridgard, Leighton, Advanced contact identification system.
  5. Chan, Wilson Wai Shun; Pruscino, Angelo; Roesch, Stefan; Zoll, Michael; Yurek, Tolga, Affinity-based recovery/failover in a cluster environment.
  6. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  7. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  8. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  9. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  10. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  11. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  12. Larson, Victor; Short, III, Robert; Munger, Edmund; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  13. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D., Agile network protocol for secure communications with assured system availability.
  14. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D.; Schmidt, Douglas Charles, Agile network protocol for secure communications with assured system availability.
  15. Munger, Edmund; Schmidt, Douglas; Short, III, Robert; Larson, Victor; Williamson, Michael, Agile network protocol for secure communications with assured system availability.
  16. Munger, Edmund Colby; Schmidt, Douglas Charles; Short, III, Robert Dunham; Larson, Victor; Williamson, Michael, Agile network protocol for secure video communications with assured system availability.
  17. Tu, Edgar Allan; Pang, Eric, Apparatus and method for operational support of remote network systems.
  18. Billharz, Alan M.; Nonis, Aaron J.; Darnell, Scott; Fishman, Neil S.; Daugherty, Tracy M., Architecture for connecting a remote client to a local client desktop.
  19. Shrader, Theodore Jack London; Rich, Bruce Arland; Yarsa, Julianne; Skibbie, Donna, Architecture for dynamic permissions in java.
  20. Miller, Karl Frederick, Authentication proxy agent.
  21. Miller, Karl Frederick, Authentication proxy agent.
  22. McFate, Marlin Popeye; Vange, Mark, Automated network infrastructure test and diagnostic system and method therefor.
  23. McFate, Marlin Popeye; Vange, Mark, Automated network infrastructure test and diagnostic system and method therefor.
  24. McFate, Marlin Popeye; Vange, Mark, Automated network infrastructure test and diagnostic system and method therefor.
  25. McGhie, Sean I.; Buchheit, Brian K., Automated teller machine (ATM) providing money for loyalty points.
  26. Poling, Robert; Pugh, Richard S., Automatic discovery of users associated with screen names.
  27. Multer,David L.; Garner,Robert E.; Ridgard,Leighton A.; Stannard,Liam J.; Cash,Donald W.; Klein,Scott; Onyon,Richard M., Base rolling engine for data transfer and synchronization system.
  28. Miller,Eric E., Biometric authentication of a client network connection.
  29. Major, Robert Drew, Cache object store.
  30. Shu,Li; Weinstein,William, Camouflage of network traffic to resist attack.
  31. Hopen, Chris; Tomlinson, Gary; Anandam, Parvez; Young, Brian; Flagg, Alan, Classifying an operating environment of a remote computer.
  32. Gutjahr, Bernd, Client-server apparatus and method using alternative-response protocols.
  33. Amin,Baber; Ebrahimi,Hashem Mohammad, Computer network having a security layer interface independent of the application transport mechanism.
  34. Rouse, John D.; Delaney, Raymond P., Confidence-based authentication.
  35. Edwards,James W.; Saint Hilaire,Ylian; Richardson,John W., Connectivity in the presence of barriers.
  36. Haines, Robert E.; Harper, Mark A.; Hinrichs, Kenley; Baumunk, Mary B.; Goettemoeller, Jodi; Whaley, Sharon, Consumable order-assistance system for computer peripheral device within a single connection environment and method for replenishing consumables.
  37. Haines, Robert E., Consumables/printer management system with task and calendar links.
  38. O'Toole, Jr., James W., Content request redirection from a wed protocol to a file protocol.
  39. McGhie, Sean I.; Buchheit, Brian K., Conversion of credits to funds.
  40. McGhie, Sean I.; Buchheit, Brian K., Conversion of loyalty points for a financial institution to a different loyalty point program for services.
  41. McGhie, Sean I.; Buchheit, Brian K., Conversion of loyalty points for gaming to a different loyalty point program for services.
  42. McGhie, Sean I.; Buchheit, Brian K., Conversion of loyalty program points to commerce partner points per terms of a mutual agreement.
  43. McGhie, Sean I.; Buchheit, Brian K., Conversion of non-negotiable credits to entity independent funds.
  44. Buchheit, Brian K.; Mghie, Sean I., Conversion operations for loyalty points of different programs redeemable for services.
  45. McGhie, Sean I.; Buchheit, Brian K., Conversion operations of non-negotiable credits to funds between an entity and a commerce partner.
  46. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of in-game credits to entity independent or negotiable funds.
  47. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of non-negotiable credits to entity independent funds.
  48. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of non-negotiable credits to in-game funds for in-game purchases.
  49. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of non-negotiable credits to in-game funds for in-game purchases.
  50. Loaiza,Juan R.; Macnaughton,Neil James Scott; Chandrasekaran,Sashikanth, Creating and dissolving affinity relationships in a cluster.
  51. Hopen, Chris; Sauve, Bryan; Hoover, Paul; Perry, Bill, Creating rules for routing resource access requests.
  52. McGhie, Sean I.; Buchheit, Brian K., Cross marketing between an entity's loyalty point program and a different loyalty program of a commerce partner.
  53. Vange, Mark; Plumb, Marc; Kouts, Michael; Wilson, Glenn Sydney, Data prioritization system and method therefor.
  54. Vange, Mark; Plumb, Marc; Kouts, Michael; Wilson, Glenn Sydney, Data redirection system and method therefor.
  55. Vange, Mark; Plumb, Mark; Kouts, Michael; Wilson, Glenn Sydney; Chekhovtsov, Alexandr, Data redirection system and method therefor.
  56. Multer, David L.; Garner, Robert E.; Ridgard, Leighton A.; Stannard, Liam J.; Cash, Donald W.; Onyon, Richard M., Data transfer and synchronization between mobile systems using change log.
  57. Multer, David L.; Garner, Robert E.; Ridgard, Leighton A.; Stannard, Liam J.; Cash, Donald W.; Onyon, Richard M., Data transfer and synchronization system.
  58. Multer, David L.; Garner, Robert E.; Ridgard, Leighton A.; Stannard, Liam J.; Cash, Donald W.; Onyon, Richard M., Data transfer and synchronization system.
  59. Imaeda,Takashi; Endo,Kimitaka; Nakayama,Jouji; Yamamoto,Tetsuya; Shimokura,Ken ichiro; Yabuuchi,Tsutomu; Tezuka,Hirohisa; Urano,Masato, Database access control method, database access controller, agent processing server, database access control program, and medium recording the program.
  60. Markovitz, Oren; Hecht, Yoseph; Argov, Nitay; Kanfi, Zohar, Decentralized caching system.
  61. Markovitz, Oren; Hecht, Yoseph; Argov, Nitay; Kanfi, Zohar, Decentralized caching system.
  62. Shah, Hemal V.; Regnier, Greg J.; Foong, Annie, Decoupling TCP/IP processing in system area networks with call filtering.
  63. Sinha,Bipul; Ganesh,Amit; Chidambaran,Lakshminarayanan, Deferred piggybacked messaging mechanism for session reuse.
  64. Dalton, Christopher I., Demonstrating integrity of a compartment of a compartmented operating system.
  65. Macnaughton, Neil James Scott; Chandrasekaran, Sashikanth, Determining affinity in a cluster.
  66. Pauly, Thomas F., Device and method for virtual private network connection establishment.
  67. Onyon, Richard; Stannard, Liam; Ridgard, Leighton, Device message management system.
  68. Onyon, Richard; Stannard, Liam; Ridgard, Leighton, Device message management system.
  69. Onyon, Richard; Stannard, Liam; Ridgard, Leighton, Device message management system.
  70. Cahill, Conor P., Displaying a true URL in response to a user interaction.
  71. Tamas, Alexis; Bellier, Gregory, Distributed computing architecture.
  72. Tamas, Alexis; Bellier, Gregory, Distributed computing architecture.
  73. Thornton, Randy; McFate, Marlin Popeye; Shaughnessy, Robert John, Dynamic network link acceleration.
  74. Vange, Mark; Plumb, Marc; Kouts, Michael; Wilson, Glenn Sydney; Thornton, Randy; McFate, Marlin Popeye; Shaughnessy, Robert John, Dynamic network link acceleration.
  75. Vange, Mark; Plumb, Mark; Kouts, Michael; Wilson, Glenn Sydney; Thornton, Paul Randy; McFate, Marlin Popeye; Shaughnessy, Robert John, Dynamic network link acceleration for network including wireless communication devices.
  76. Chan,Wilson Wai Shun; Pruscino,Angelo; Roesch,Stefan; Zoll,Michael, Dynamic remastering for a subset of nodes in a cluster environment.
  77. Wray,Michael, Electronic certificate.
  78. Koyfman, Andrew, Encrypted table indexes and searching encrypted tables.
  79. Kramer,Michael; Kadyk,Donald J.; Fishman,Neil S., Establishing a secure connection with a private corporate network over a public network.
  80. Chavez, John Anthony; Ridgard, Leighton, Event dependent notification system and method.
  81. McGhie, Sean I.; Buchheit, Brian K., Exchange of non-negotiable credits of an entity's rewards program for entity independent funds.
  82. Shah,Hemal V.; Foong,Annie, Filtering calls in system area networks.
  83. Chen, Yihsiu; Foladare, Mark Jeffrey; Goldman, Shelley B.; Killian, Thomas Joseph; Schryer, Norman Loren; Stone, Kevin; Weber, Roy Philip, Flexible automated connection to virtual private networks.
  84. Buchheit, Brian K.; Mghie, Sean I., Graphical user interface for the conversion of loyalty points for services.
  85. McGhie, Sean I.; Buchheit, Brian K., Graphical user interface for the conversion of loyalty points via a loyalty point website.
  86. Haines,Robert E., Hard image forming systems and hard imaging device configuration methods.
  87. Haines, Robert E.; Taggart, John D., Hardcopy output engine configuration apparatus and method.
  88. Nair, Sushil; Zolotusky, Anatol; Charpentier, Claude; Metzger, Brian, High performance data encryption server and method for transparently encrypting/decrypting data.
  89. Cahill, Conor P., Identifying URL target hostnames.
  90. Cahill, Conor P., Identifying URL target hostnames.
  91. Ben-Natan, Ron; Segal, Ury, Identifying attribute propagation for multi-tier processing.
  92. Cahill,Conor P.; Wexelblat,David Eli; Aoki,Norihiro Edwin; Carriere,Jeromy; Roskind,James; Toomey,Christopher Newell, Identity based service system.
  93. Doshi, Kshitij A.; Ebrahimi, Hashem Mohammad; McClain, Carolyn B., Identity broker tools and techniques for use with forward proxy computers.
  94. Irudayaraj,Rajkumar, Implicit connection caching.
  95. Takahashi, Seiji; Kobayashi, Hiroki; Kobayashi, Sayaka, Information processing apparatus and information processing method.
  96. Felsher, David Paul, Information record infrastructure, system and method.
  97. Feller, Todd Stacy Leo, Initiating operating system commands based on browser cookies.
  98. Gary Hanson, Integration of self-determined consumable usage model in pigmentation material low/out forecast.
  99. Goodwin, III, James S.; Jain, Amit; Natarajan, Ravi, Intelligent HTTP based load-balancing, persistence, and application traffic management of SSL VPN tunnels.
  100. Bonefas, Rudy G.; Sobchak, Richard K.; Zombek, James M., Intelligent messaging network server interconnection.
  101. Chun, Jon Andre; Hui Hsu, Stephen Dao; Hormuzdiar, James Noshir, Intelligent secure data manipulation apparatus and method.
  102. Cook,Fred S., Intranet platform system.
  103. Howard, Christopher J.; Levy, Peter S.; de la Cuesta, Joshue D., Limited-use browser and security system.
  104. Howard, Christopher J.; Levy, Peter S.; de la Cuesta, Joshue D., Limited-use browser and security system.
  105. Howard,Christopher J.; Levy,Peter S.; de la Cuesta,Joshue D., Limited-use browser and security system.
  106. Howard,Christopher J.; Levy,Peter S.; de la Cuesta,Joshue D., Limited-use browser and security system.
  107. Harper, Mark A.; Haines, Robert E., Localizing client purchasing of consumables for hardcody output engine and method.
  108. Hackney, Bede K. C., Management of network quality of service.
  109. Hackney,Bede K. C., Management of network quality of service.
  110. Mellmer, Joseph Andrew; Young, Russell T.; Perkins, Arn D.; Robertson, John M.; Sabin, Jeffrey Neil; McDonald, Michael C.; Phillips, Douglas; Sheridan, Robert Michael; Nazeer, Nadeem Ahmad; Higley, DeeAnne Barker; Carter, Stephen R.; Earl, Douglas G.; Sonderegger, Kelly E.; Ferguson, Daniel T.; Brough, Farrell Lynn, Managing digital identity information.
  111. Mellmer, Joseph Andrew; Young, Russell T.; Perkins, Arn D.; Robertson, John M.; Sabin, Jeffrey Neil; McDonald, Michael C.; Phillips, Douglas; Sheridan, Robert Michael; Nazeer, Nadeem Ahmad; Higley, DeeAnne Barker; Carter, Stephen R.; Earl, Douglas G.; Sonderegger, Kelly E.; Ferguson, Daniel T.; Brough, Farrell Lynn, Managing digital identity information.
  112. Hopen, Chris; Sauve, Bryan; Hoover, Paul; Perry, Bill, Managing resource allocations.
  113. Soderberg, Joel M.; Deen, Brian J.; Hopmann, Alexander I., Mapping connections and protocol-specific resource identifiers.
  114. Lu, Jarrett J.; Carlson, James D.; Faden, Glenn T., Mechanism for enabling a network address to be shared by multiple labeled containers.
  115. McDonough, John C.; McDonough, Suzanne K.; O'Brien, Erin D., Message passing over secure connections using a network server.
  116. Wray,Michael, Method and apparatus for a secure communications session with a remote system via an access-controlling intermediate system.
  117. Gupta Abhay ; Ferris Chris ; Abdelnur Alejandro, Method and apparatus for authenticating users.
  118. Gupta, Abhay; Ferris, Chris; Abdelnur, Alejandro, Method and apparatus for authenticating users.
  119. Bellovin, Steven Michael; Killian, Thomas Joseph; LaRose, Bruce; Rubin, Aviel D.; Schryer, Norman Loren, Method and apparatus for connection to virtual private networks for secure transactions.
  120. Bellovin, Steven Michael; Killian, Thomas Joseph; LaRose, Bruce; Rubin, Aviel D.; Schryer, Norman Loren, Method and apparatus for connection to virtual private networks for secure transactions.
  121. Arthur A. van Hoff, Method and apparatus for controlling client computer systems.
  122. Wray,Michael, Method and apparatus for discovering a trust chain imparting a required attribute to a subject.
  123. Hsu, Stephen Dao Hui; Hormuzdiar, James Noshir; Chun, Jon A, Method and apparatus for encrypted communications to a secure server.
  124. Hsu,Stephen Dao Hui; Hormuzdiar,James Noshir; Chun,Jon A, Method and apparatus for encrypted communications to a secure server.
  125. Hui Hsu, Stephen Dao; Hormuzdiar, James Noshir, Method and apparatus for encrypted communications to a secure server.
  126. Bailey,William B.; Swanson,Edward W.; Bishop,Fred, Method and apparatus for locating a communication device using local area network switch information.
  127. Bertani,John A.; Kerr,John M., Method and apparatus for providing an automated login process.
  128. Strentzsch Scott A. ; Donzis Lewis T., Method and apparatus for providing network access control using a domain name system.
  129. Aziz, Ashar; Baehr, Geoffrey; Caronni, Germano; Gupta, Amit; Gupta, Vipul; Scott, Glenn C., Method and apparatus for providing secure communication with a relay in a network.
  130. Gmuender, John E.; Nguyen, Huy Minh; Levy, Joseph H.; Massing, Michael B.; Chen, Zhong; Telehowski, David M., Method and apparatus for resource locator identifier rewrite.
  131. Gmuender, John E.; Nguyen, Huy Minh; Levy, Joseph H.; Massing, Michael B.; Chen, Zhong; Telehowski, David M., Method and apparatus for resource locator identifier rewrite.
  132. Gmuender, John E.; Nguyen, Huy Minh; Levy, Joseph H.; Massing, Michael B.; Chen, Zhong; Telehowski, David M., Method and apparatus for resource locator identifier rewrite.
  133. Gmuender,John E.; Nguyen,Huy Minh; Levy,Joseph H.; Massing,Michael B.; Chen,Zhong; Telehowski,David M., Method and apparatus for resource locator identifier rewrite.
  134. Bright, Walter G.; Engstrom, Eric, Method and apparatus for simplified access to online services.
  135. Boneh, Dan; Chawla, Rajeev; Frindell, Alan; Goh, Eu-Jin; Modadugu, Nagendra; Tsirigotis, Panagiotis, Method and apparatus for transparent encryption.
  136. Ariel Cohen ; Sampath Rangarajan ; Navjot Singh, Method and apparatus for transparently directing requests for web objects to proxy caches.
  137. Bhatia, Gaurav; Swaminathan, Arun; Desai, Ajay, Method and apparatus to facilitate security-enabled content caching.
  138. Ichikawa Takeo,JPX ; Kayama Hidetoshi,JPX ; Yamamoto Hiroyuki,JPX ; Takanashi Hitoshi,JPX ; Morikura Masahiro,JPX, Method and base station for packet transfer.
  139. Sinha,Bhaskar; Vennelakanti,Ravigopal; Rebala,Goplnath, Method and system for authenticating a user in a web-based environment.
  140. Tretheway,James R.; Shah,Kamal R., Method and system for automatic invocation of secure sockets layer encryption on a parallel array of Web servers.
  141. Chawla,Rajeev; Tsirigotis,Panagiotis; Boneh,Dan, Method and system for caching secure web content.
  142. Sundaresan,Neelakantan, Method and system for co-browsing in electronic commerce.
  143. Crosbie,David B., Method and system for enabling centralized control of wireless local area networks.
  144. Crosbie,David B., Method and system for enabling seamless roaming in a wireless network.
  145. Ramachandran,Viyyokaran R.; Choudhary,Manoj; Madhusudhana,Honnuduke S., Method and system for filtering spoofed packets in a network.
  146. Morris, Brian C.; Hertzog, Scott P.; Yohe, Thomas P., Method and system for increasing data access in a secure socket layer network environment.
  147. Juitt,David; Bates,Philip; Christoffel,Thomas; Crawshaw,Geoffrey; Crosbie,David, Method and system for managing data traffic in wireless networks.
  148. Chan Wilson Wai Shun ; Wang Tak Fung ; Grewell Patricia, Method and system for mastering locks in a multiple server database system.
  149. O'Leary, Denis; D'Agostino, Vincent; Re, S. Richard; Burney, Jessica; Hoffman, Adam, Method and system for processing internet payments.
  150. Stannard, Liam; Huff, Brandon; Burns, Jason; Taketa, Bryan; Onyon, Jr., Richard, Method and system for promoting and transferring licensed content and applications.
  151. Boysko, Glenn J.; Hurwood, William; Li, Benjamin Z.; Warikoo, Abhimanyu, Method and system for security and user account integration by reporting systems with remote repositories.
  152. Hofheinz, Walter-Jürgen; Scharf, Dietmar; Stein-Lausnitz, Karl-Heinrich v., Method for a secure information transfer.
  153. Chantrain, Dominique Helena Lucia; Focant, St?phane; Marly, Nick, Method for connecting a first user-terminal to a second using-terminal, related devices and related software modules.
  154. Narayanan,Lakshmi, Method for controlled and audited access to privileged accounts on computer systems.
  155. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  156. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  157. Larson, Victor; Short, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing encrypted channel.
  158. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  159. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  160. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  161. Guyan,G. Victor; Costonis,Michael A.; Gallo,Vanessa Gabriela; Lucarini,Michael A., Method for evaluating activity-based costs of a company.
  162. Zhan, Kaijun; Harper, James, Method for managing data in a shared computing environment.
  163. Edwards, John, Method for the provision of a network service.
  164. Patrick,Kyle Nathan, Method systems and computer program products for indicating links to external URLs.
  165. Dutta,Rabindranath, Method, system, and computer program product to redirect requests from content servers to load distribution servers and to correct bookmarks.
  166. Chase, Joshua Miles; Aviani, James A.; Lueckenhoff, Bruce Arthur; Mueller, II, Kenneth Earl, Methods and apparatus for providing content over a computer network.
  167. Maino, Fabio R.; Di Benedetto, Marco; Desanti, Claudio, Methods and apparatus for security over fibre channel.
  168. Papakostas, Achilleas, Methods and apparatus to credit internet usage.
  169. Papakostas, Achilleas; Cimino, Susan, Methods and apparatus to improve usage crediting in mobile devices.
  170. Papakostas, Achilleas; Cimino, Susan, Methods and apparatus to improve usage crediting in mobile devices.
  171. Crosbie,David B.; Walter,Benjamin J.; Bates,Philip M., Methods and systems for clock synchronization across wireless networks.
  172. Bowie Britton,Simon, Methods and systems for managing successful completion of a network of processes.
  173. Besehanic, Jan, Methods, apparatus, and articles of manufacture to identify media presentation devices.
  174. Besehanic, Jan, Methods, apparatus, and articles of manufacture to identify media presentation devices.
  175. Ridgard, Leighton A.; Garner, Robert E.; Multer, David L.; Stannard, Liam J.; Cash, Donald W.; Onyon, Richard M.; Huff, Brandon; Burns, Jason; Taketa, Bryan, Mobile data transfer and synchronization system.
  176. Arsenault, David, Modifying browser requests to track browsing activities.
  177. Thrash,Ralph W.; McGrath,Dennis P.; Paper,Anthony M.; Purohit,Siddharth N., Multi-level multi-user web services security system and method.
  178. Lindteigen, Ty Brendan, Multi-wrapped virtual private network.
  179. Hoffberg, Steven M., Multifactorial optimization system and method.
  180. Frindell, Alan H.; Hill, Dan; Gopalakrishnan, Venkitachalam; Laqtib, Abdesalam; Murray, Eric, Multikey support for multiple office system.
  181. Wonnacott, Paul, Multiple address hyperlinks.
  182. Blanco, Marcos Ares; Marco, Regis, Network access authentication system.
  183. Edwards, John, Network communications.
  184. Yoshida, Takeo, Network connection system.
  185. Ben-Natan, Ron, Network intrusion blocking security overlay.
  186. McBride, Brian; Bou-Diab, Bashar Said; Serghi, Laura Mihaela, Network services infrastructure systems and methods.
  187. Ben-Natan, Ron, Nondestructive interception of secure data in transit.
  188. Hensley, John Alan; Fischer, Robert, On-premises data access and firewall tunneling.
  189. McGhie, Sean I.; Buchheit, Brian K., Online shopping sites for redeeming loyalty points.
  190. Chan,Wilson Wai Shun; Pruscino,Angelo; Roesch,Stefan; Zoll,Michael; Yurek,Tolga, Optimization for transaction failover in a multi-node system environment where objects' mastership is based on access patterns.
  191. Morton, Gary D.; Thornton, Paul R.; Pressley, Ryan; Shaughnessy, Robert John; Vange, Mark; Plumb, Mark; Kouts, Michael; Wilson, Glenn Sydney, Optimization of enhanced network links.
  192. Morton, Gary D.; Thornton, Paul R.; Pressley, Ryan; Shaughnessy, Robert John; Vange, Mark; Plumb, Mark; Kouts, Michael; Wilson, Glenn Sydney, Optimization of enhanced network links.
  193. Morton, Gary D.; Thornton, Paul R.; Pressley, Ryan; Shaughnessy, Robert John; Vange, Mark; Plumb, Mark; Kouts, Michael; Wilson, Glenn Sydney, Optimization of enhanced network links.
  194. Morton, Gary D.; Thornton, Paul R.; Pressley, Ryan; Shaughnessy, Robert John; Vange, Mark; Plumb, Mark; Kouts, Michael; Wilson, Glenn Sydney, Optimization of enhanced network links.
  195. Muth, John; McClanahan, Edward D.; Patel, Dhaval; Swaminathan, Manish, Optimized segment cleaning technique.
  196. Karasawa, Kei; Matsuura, Katsunori, Packet encryption substituting device, method thereof, and program recording medium.
  197. Mowers, David R.; Banes, John A.; Simon, Daniel R.; Leach, Paul J., Pass-thru for client authentication.
  198. Mowers, David R.; Banes, John A.; Simon, Daniel R.; Leach, Paul J., Pass-thru for client authentication.
  199. Mowers, David R.; Banes, John; Simon, Daniel R.; Leach, Paul J., Pass-thru for client authentication.
  200. Mowers, David R.; Simon, Daniel R.; Leach, Paul J.; Banes, John A., PassThru for client authentication.
  201. Onyon, Richard M.; Stannard, Liam J.; Ridgard, Leighton A., Personal information space management system and method.
  202. Mangan,John F., Policy based routing system and method for caching and VPN tunneling.
  203. Dillon, Doug; Belmar, Ricardo; Sebastine, Seejo, Pre-fetching secure content using proxy architecture.
  204. Devonshire, Karyn; Lobb, Jason, Private network system and method.
  205. Arsenault, David, Processing browser requests based on trap lists.
  206. Arsenault, David, Processing browser requests to provide multiple portions of content having a consistent appearance.
  207. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Processing data using information embedded in a data request.
  208. Arsenault, David, Processing selected browser requests.
  209. Arsenault, David, Processing selected browser requests.
  210. Abdulrahiman, Najeeb; Guo, Lisa, Protocol to prevent replay attacks on secured wireless transactions.
  211. Hospodor, Andrew D., Providing streaming media data.
  212. Hospodor,Andrew D, Providing streaming media data.
  213. Hopen, Chris; Tomlinson, Gary; Anandam, Parvez; Young, Brian; Flagg, Alan, Provisioning remote computers for accessing resources.
  214. Nice, Nir; Schultz, Benjamin M.; Venkataramaiah, Narasimhan A., Redirection of secure data connection requests.
  215. Chan,Wilson Wai Shun; Pruscino,Angelo; Roesch,Stefan; Zoll,Michael, Remastering for asymmetric clusters in high-load scenarios.
  216. Litovski, Ivan; Edwards, John, Remote access to resources.
  217. Litovski, Ivan; Edwards, John, Remote access to resources.
  218. Hopen, Chris; Tomlinson, Gary; Anandam, Parvez; Young, Brian; Flagg, Alan; O'Reilley, Jude Michael Dylan, Remote access to resources over a network.
  219. Hopen, Chris; Tomlinson, Gary; Anandam, Parvez; Young, Brian; Flagg, Alan; O'Reilley, Jude Michael Dylan, Remote access to resources over a network.
  220. Hopen, Chris; Tomlinson, Gary; Anandam, Parvez; Young, Brian; Flagg, Alan; O'Reilley, Jude Michael Dylan, Remote access to resources over a network.
  221. Hopen, Chris; Tomlinson, Gary; Anandam, Parvez; Young, Brian; Flagg, Alan; O'Reilley, Jude Michael Dylan, Remote access to resources over a network.
  222. Haines, Robert E., Reorder assistance notification interaction and method.
  223. Haines,Robert E.; Harper,Mark A., Reorder assistance notification of near end-of-life consumables and method.
  224. Jellinek, Herbert D., Reverse proxy mechanism for retrieving electronic content associated with a local network.
  225. McGhie, Sean I.; Buchheit, Brian K., Rewards program website permitting conversion/transfer of non-negotiable credits to entity independent funds.
  226. McGhie, Sean I.; Buchheit, Brian K., Rewards program with payment artifact permitting conversion/transfer of non-negotiable credits to entity independent funds.
  227. Vange, Mark; Plumb, Marc; Kouts, Michael; Wilson, Glenn Sydney; Guerin, Roch; Rajan, Rajendran, Route aware network link acceleration.
  228. Hopen, Chris; Sauve, Bryan; Hoover, Paul; Perry, Bill, Rule-based routing to resources through a network.
  229. Hopen, Chris; Sauve, Bryan; Hoover, Paul; Perry, Bill, Rule-based routing to resources through a network.
  230. Hopen, Chris; Sauve, Bryan; Hoover, Paul; Perry, Bill, Rule-based routing to resources through a network.
  231. Hopen, Chris; Sauve, Bryan; Hoover, Paul; Perry, Bill, Rule-based routing to resources through a network.
  232. Hopen, Chris; Sauve, Bryan; Hoover, Paul; Perry, Bill, Rule-based routing to resources through a network.
  233. Segre, Marc; Wyskida, Andrew Paul, Secure access to a private network through a public wireless network.
  234. Hoover, Paul Lawrence; Erickson, Rodger Del; Sauve, Bryan, Secure access to remote resources over a network.
  235. Hoover, Paul Lawrence; Erickson, Rodger Del; Sauve, Bryan, Secure access to remote resources over a network.
  236. Hoover, Paul Lawrence; Erickson, Rodger Del; Sauvé, Bryan, Secure access to remote resources over a network.
  237. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Secure data exchange.
  238. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Secure data exchange based on request destination.
  239. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S.; Hendren, III, C. Hudson, Secure data exchange between data processing systems.
  240. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Secure data exchange between data processing systems.
  241. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Secure data exchange for processing requests.
  242. Friday, Victor, Secure data storage device.
  243. Immonen, Olli, Secure handshake protocol.
  244. Kamiwada, Toru; Sonoda, Toshihiro; Kawai, Jun, Secure virtual private network having a gateway for managing global ip address and identification of devices.
  245. Amit, Neta; Frank, Alexander, Secured distributed impersonation.
  246. Orman,Hilarie K., Security context sharing.
  247. Wray, Michael, Security protocol.
  248. Wray,Michael; Ferguson,Niels, Security protocol.
  249. Ben-Natan, Ron; Tarandach, Izar, Selective local database access restriction.
  250. McGhie, Sean I.; Buchheit, Brian K., Self-service stations for utilizing non-negotiable credits earned from a game of chance.
  251. Schoinas, Ioannis T.; Jayasimha, Doddaballapur Narasimha-Murthy, Separable transport layer in cache coherent multiple component microelectronic systems.
  252. Fyke, Steven Henry; Burrell, Douglas James Arthur; McManus, Soussamay, Smart plug or cradle.
  253. Hoover, Paul Lawrence; Erickson, Rodger Del; Sauvé, Bryan, Smart tunneling to resources in a network.
  254. Summers,David L.; Wesemann,Darren L., Spontaneous virtual private network between portable device and enterprise network.
  255. Wu, Yuan-Jye; Kao, Anne S-W; Poteet, Stephen R.; Ferng, William; Cranfill, Robert E., Streaming text data mining method and apparatus using multidimensional subspaces.
  256. Multer,David L.; Garner,Robert E.; Ridgard,Leighton A.; Stannard,Liam J.; Cash,Donald W.; Onyon,Richard M., Synchronization system application object interface.
  257. Vange, Mark; Plumb, Mark; Kouts, Michael; Wilson, Glenn Sydney; Thornton, Paul Randy; McFate, Marlin Popeye; Shaughnessy, Robert John, System and devices facilitating dynamic network link acceleration.
  258. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  259. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  260. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  261. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  262. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  263. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  264. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  265. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  266. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  267. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  268. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  269. de Boer, Elts; Jackson, Glyn Philip; Ramsey, Samuel Martin; Voltmer, Theodore S., System and method for a merchant loyalty system.
  270. de Boer, Elts; Jackson, Glyn Philip; Ramsey, Samuel Martin; Voltmer, Theodore S., System and method for a merchant loyalty system.
  271. Chatterjee, Aditya N.; Guimaraes, Roberto; Kadrichu, Hanny P.; Bowers, Steven, System and method for acceleration of a secure transmission over satellite.
  272. Chatterjee, Aditya N.; Rodrigues, Roberto G.; Kadrichu, Hanny P.; Bowers, Steven, System and method for acceleration of a secure transmission over satellite.
  273. Chatterjee, Aditya; Rodrigues, Roberto; Kadrichu, Hanny; Bowers, Steven, System and method for acceleration of a secure transmission over satellite.
  274. Benson, Glenn S., System and method for anti-phishing authentication.
  275. Benson, Glenn S., System and method for anti-phishing authentication.
  276. Benson, Glenn S., System and method for anti-phishing authentication.
  277. Benson, Glenn S., System and method for anti-phishing authentication.
  278. Gendler, Joseph, System and method for automatic financial project management.
  279. Cheng, Heung-For; Ramachandran, Mahendra; Vuppula, Srinivas, System and method for common information model object manager proxy interface and management.
  280. Hoffberg, Steven M., System and method for determining contingent relevance.
  281. Caronni, Germano; Gupta, Amit; Kumar, Sandeep; Markson, Tom R.; Schuba, Christoph L.; Scott, Glenn C., System and method for enabling scalable security in a virtual private network.
  282. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing a communication link.
  283. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing an encrypted communication link based on IP address lookup requests.
  284. Warren, Mary Carter; Fredman, Marc L.; Hoechst, Kimberly L.; Filak, Douglas A.; Steckart, James C.; Blossom, George W.; Jacobs, Ron E.; Barrett, Donna M.; Schmitt, Donald H.; Strock, Bradley R.; Witsil, Kathleen H.; Ehemann, Karen R.; Dowidchuck, Katrina, System and method for establishing or modifying an account with user selectable terms.
  285. McClain, Carolyn B.; Thatcher, Jim E., System and method for filtering of web-based content stored on a proxy cache server.
  286. McClain,Carolyn B.; Thatcher,Jim E., System and method for filtering of web-based content stored on a proxy cache server.
  287. Gnagy,Matthew R.; Champagne,Jean Philippe; Aviani,James A.; Lueckenhoff,Bruce Arthur; O'Toole, Jr.,James W., System and method for generalized URL-rewriting.
  288. Read, Matthew J.; Ames, Craig S.; Nangia, Vinit; Lobashov, Pavel; Lam, Josiah, System and method for generating and managing administrator passwords.
  289. Read, Matthew J.; Ames, Craig S.; Nangia, Vinit; Lobashov, Pavel; Lam, Josiah, System and method for generating and managing administrator passwords.
  290. Vange, Mark; Plumb, Marc; Kouts, Michael; Wilson, Glenn Sydney, System and method for implementing application functionality within a network infrastructure.
  291. Vange, Mark; Plumb, Marc; Kouts, Michael; Wilson, Glenn Sydney, System and method for implementing application functionality within a network infrastructure.
  292. Vange, Mark; Plumb, Marc; Kouts, Michael; Wilson, Glenn Sydney, System and method for implementing application functionality within a network infrastructure.
  293. Vange, Mark; Plumb, Mark; Kouts, Michael; Wilson, Glenn Sydney, System and method for implementing application functionality within a network infrastructure.
  294. Vange, Mark; Plumb, Mark; Kouts, Michael; Wilson, Glenn Sydney, System and method for implementing application functionality within a network infrastructure.
  295. Vange, Mark; Plumb, Mark; Kouts, Michael; Wilson, Glenn Sydney, System and method for implementing application functionality within a network infrastructure.
  296. Vange,Mark; Plumb,Marc; Kouts,Michael; Wilson,Glenn Sydney, System and method for implementing application functionality within a network infrastructure.
  297. Vange, Mark; Plumb, Marc; Kouts, Michael; Wilson, Glenn Sydney, System and method for implementing application functionality within a network infrastructure including a wireless communication link.
  298. Vange, Mark; Plumb, Marc; Kouts, Michael; Wilson, Glenn Sydney, System and method for implementing application functionality within a network infrastructure including wirelessly coupled devices.
  299. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  300. Selene K. Makarios ; Robert C. Fitzwilson, System and method for maintaining state information between a web proxy server and its clients.
  301. Smith, Jack J.; Burright, Richard T.; Worley, III, W. Spencer; MacDonell, Eoin B.; Vastano, John A.; Weatherford, William T., System and method for managing connections between a client and a server.
  302. Smith, Jack J.; Burright, Richard T.; Worley, III, W. Spencer; MacDonell, Eoin B.; Vastano, John A.; Weatherford, William T., System and method for managing connections between a client and a server.
  303. Haines, Mark; Ferrell, Raymond R; Ariff, Fauziah B; Voltmer, Theodore S, System and method for monitoring consumer purchasing activity.
  304. Zhou, Todd Tao; Batista, Ricardo, System and method for monitoring secure data on a network.
  305. Scott, Kelly W., System and method for network-based project management.
  306. Ariff, Fauziah B.; Voltmer, Theodore S.; Antonucci, Donna A.; Greenhut, Scott M.; Hayes, John; Sneddon, Kendall; Ciccarone, Christine D.; Ewell, Jason; Lam, Johnson; Zaiac, Joanne; Lang, Laura; Bharwani, Seraj; Zeisser, Michel P.; Fernandes, Joseph; Segal, Elizabeth Hilton, System and method for networked loyalty program.
  307. Ariff, Fauziah B.; Voltmer, Theodore S.; Antonucci, Donna A.; Greenhut, Scott M.; Hayes, John; Sneddon, Kendall; Ciccarone, Christine D.; Ewell, Jason; Lam, Johnson; Zaiac, Joanne; Lang, Laura; Bharwani, Seraj; Zeisser, Michel P.; Fernandes, Joseph; Segal, Elizabeth Hilton, System and method for networked loyalty program.
  308. Ariff, Fauziah B.; Voltmer, Theodore S.; Antonucci, Donna A.; Greenhut, Scott M.; Hayes, John; Sneddon, Kendall; Ciccarone, Christine D.; Ewell, Jason; Lam, Johnson; Zaiac, Joanne; Lang, Laura; Bharwani, Seraq; Zeisser, Michel P.; Fernandes, Joseph; Segel, Elizabeth Hilton, System and method for networked loyalty program.
  309. Ariff, Fauziah B; Voltmer, Theodore S; Antonucci, Donna A; Greenhut, Scott M; Hayes, John; Sneddon, Kendall; Ciccarone, Christine D; Ewell, Jason; Lam, Johnson; Zaiac, Joanne; Lang, Laura; Bharwani, Seraq; Zeisser, Michel P; Fernandes, Joseph; Segel, Elizabeth Hilton, System and method for networked loyalty program.
  310. Ariff, Fauziah B; Voltmer, Theodore S; Antonucci, Donna A; Greenhut, Scott M; Hayes, John; Sneddon, Kendall; Ciccarone, Christine D; Ewell, Jason; Lam, Johnson; Zaiac, Joanne; Lang, Laura; Bharwani, Seraq; Zeisser, Michel P; Fernandes, Joseph; Segel, Elizabeth Hilton, System and method for networked loyalty program.
  311. Voltmer, Theodore S.; Ariff, Fauziah B., System and method for networked loyalty program.
  312. Voltmer, Theodore S.; Ariff, Fauziah B., System and method for networked loyalty program.
  313. Benson, Glenn Stuart; Croston, Sean, System and method for partner key management.
  314. Skingle, Bruce James, System and method for portal infrastructure tracking.
  315. Everhart, Glenn C., System and method for preventing identity theft or misuse by restricting access.
  316. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  317. Rosko, Robert; Gudipati, Jayashree, System and method for providing customers with seamless entry to a remote server.
  318. Rosko, Robert; Gudipati, Jayashree, System and method for providing customers with seamless entry to a remote server.
  319. Rosko,Robert; Ampani,Kumar, System and method for providing customers with seamless entry to a remote server.
  320. Bowers, Theodore J; Ilijasic, Dean; Sanders, Shelley F., System and method for providing discriminated content to network users.
  321. Sanders, Shelley F.; Bowers, Theodore; Ilijasic, Dean, System and method for providing incentives to consumers to share information.
  322. Sneh,Iftah, System and method for providing offline web application, page, and form access in a networked environment.
  323. Hicks, III, John Alson; Zimler, Randy S., System and method for providing services access through a family home page.
  324. Onyon, Richard; Pakarinen, Tony; Tani, William; Jellinek, Herb, System and method for providing social context to digital activity.
  325. Hind, Hugh; Knowles, Michael; Naqvi, Noushad; Bajar, David; Patterson, Ian M.; Burns, Anthony G.; Lewis, Allan D.; Mousseau, Gary P.; Lazaridis, Mihal, System and method for pushing information from a host system to a mobile data communication device in a wireless data network.
  326. Fei, Huchen; Yang, Dong; Hong, Xiao, System and method for rapid updating of credit information.
  327. Zombek, James M.; Edwards, Donald J., System and method for re-directing requests from browsers for communication over non-IP based networks.
  328. Zombek, James M.; Edwards, Donald J., System and method for re-directing requests from browsers for communications over non-IP based networks.
  329. Zombek, James M.; Edwards, Donald J., System and method for re-directing requests from browsers for communications over non-IP based networks.
  330. Thornton, Randy; Vange, Mark, System and method for reducing traffic and congestion on distributed interactive simulation networks.
  331. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  332. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  333. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  334. Ariff, Fauziah B.; Bishop, Fred; Neemann, Trey; Voltmer, Theodore S., System and method for securing data through a PDA portal.
  335. Bishop, Fred; Neemann, Trey; Voltmer, Theodore S; Ariff, Fauziah B, System and method for securing data through a PDA portal.
  336. Bishop,Fred; Neemann,Trey; Voltmer,Theodore S.; Ariff,Fauziah B., System and method for securing data through a PDA portal.
  337. Lehman, Dean K.; McCullough, Joseph R.; Orth, Nancy A., System and method for sending money via E-mail over the internet.
  338. Miller, Lawrence R; Trenholm, Martin J., System and method for single session sign-on.
  339. Skingle,Bruce James, System and method for single session sign-on with cryptography.
  340. Ellmore, Kimberly, System and method for single sign on process for websites with multiple applications and services.
  341. Ellmore,Kimberly, System and method for single sign on process for websites with multiple applications and services.
  342. Antonucci, Donna; Voltmer, Theodore S., System and method for the real-time transfer of loyalty points between accounts.
  343. Antonucci, Donna A.; Voltmer, Theodore S., System and method for the transfer of loyalty points.
  344. Senghore, Medina J.; Thomas, Tracey R.; Ariff, Fauziah, System and method for tiered filtering of purchase transactions.
  345. Senghore, Medina J.; Thomas, Tracey R.; Ariff, Fauziah, System and method for tiered filtering of purchase transactions.
  346. Ang, George Weilun; Townsend, Derek Jon; Woelfel, John Harold; Woloszyn, Terrence Peter, System and method for tokenization of data for storage in a cloud.
  347. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for using a registered name to connect network devices with a link that uses encryption.
  348. Mi, James; Parikh, Vishesh; Teng, Albert, System and method for using internet based caller ID for controlling access to an object stored in a computer.
  349. Chien, Emily; Sanchez, Trish; Saunders, Daniela; Wiseman, Jill; Balagopal, C R; Kinderknecht, Al; Parson, Jon W.; Preston, Ray, System and method for using loyalty rewards as currency.
  350. Woloszyn, Terrence Peter, System and method of data interception and conversion in a proxy.
  351. Swift, Michael M.; Amit, Neta; Ward, Richard B., System and method of proxy authentication in a secured network.
  352. Swift,Michael M.; Amit,Neta; Ward,Richard B., System and method of proxy authentication in a secured network.
  353. Ang, George Weilun; Woelfel, John Harold; Woloszyn, Terrence Peter, System and method of sort-order preserving tokenization.
  354. Ranganath, Panduranga, System for and method of field mapping.
  355. Onyon, Richard; Stannard, Liam; Ridgard, Leighton, System for and method of updating a personal profile.
  356. Chen, Yihsiu; Foladare, Mark Jeffrey; Goldman, Shelley B.; Killian, Thomas Joseph; Schryer, Norman Loren; Stone, Kevin; Weber, Roy Philip, System for automated connection to virtual private networks related applications.
  357. Mann, III, William Frederick; Hirka, Jeffrey L., System for providing cardless payment.
  358. Miller, Randy; Poling, Robert; Pugh, Richard S.; Shapiro, Dmitry, Systems and methods for a protocol gateway.
  359. Miller, Randy; Poling, Robert; Pugh, Richard S.; Shapiro, Dmitry, Systems and methods for authentication of target protocol screen names.
  360. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Systems and methods for connecting network devices over communication network.
  361. Miller, Randy; Poling, Robert; Pugh, Richard S.; Shapiro, Dmitry, Systems and methods for implementing protocol enforcement rules.
  362. Poling, Robert; Nielsen, Mary; Scott, Robert, Systems and methods for implementing protocol enforcement rules.
  363. Jarvie, Jay C.; Vayner, Leonid; Payne, Clive Anthony, Systems and methods for managing digital certificates.
  364. Jarvie, Jay C.; Vayner, Leonid; Payne, Clive Anthony, Systems and methods for managing digital certificates.
  365. Miller, Randy; Poling, Robert; Pugh, Richard S.; Shapiro, Dmitry, Systems and methods for managing messages in an enterprise network.
  366. Miller, Randy; Poling, Robert; Pugh, Richard S.; Shapiro, Dmitry, Systems and methods for managing messages in an enterprise network.
  367. Szwalbenest, Stanley A., Systems and methods for multifactor authentication.
  368. Szwalbenest, Stanley A., Systems and methods for multifactor authentication.
  369. Szwalbenest, Stanley A., Systems and methods for multifactor authentication.
  370. Miller,Randy; Poling,Robert; Pugh,Richard S.; Shapiro,Dmitry, Systems and methods for reflecting messages associated with a target protocol within a network.
  371. Shastri, Vijnan; Lee, Lisa; Tran, Trung, Systems and methods for remote rogue protocol enforcement.
  372. Abraham,Magid; Brown,Michael; Heyman,Steve, Systems and methods for user identification, user demographic reporting and collecting usage data usage biometrics.
  373. Hatfalvi,Emil J.; Noble,James G., Systems and methods that provide external network access from a protected network.
  374. Brown,Michael, Systems for and methods of placing user identification in the header of data packets usable in user demographic reporting and collecting usage data.
  375. Abraham, Magid; Carnes, Jeffrey; Disch, Jason; Larrison, James, Systems for and methods of user demographic reporting usable for identifying users and collecting usage data.
  376. Papakostas, Achilleas; Yonker, Michael A., Systems, methods, and apparatus to monitor mobile internet activity.
  377. Papakostas, Achilleas; Yonker, Michael Andrew, Systems, methods, and apparatus to monitor mobile internet activity.
  378. Papakostas, Achilleas; Yonker, Michael Andrew, Systems, methods, and apparatus to monitor mobile internet activity.
  379. Papakostas, Achilleas; Yonker, Michael Andrew, Systems, methods, and apparatus to monitor mobile internet activity.
  380. Papakostas, Achilleas; Yonker, Michael Andrew, Systems, methods, and apparatus to monitor mobile internet activity.
  381. Hostetter, David, Tape drive encryption in the data path.
  382. McClain,Carolyn B.; Carter,Stephen R.; Rhodes,Kevin; Ackerman,Mark D.; Andersen,Carl B.; Holm,Vernon Roger; Jensen,Stuart, Techniques for content filtering.
  383. Westman, Ilkka; Faccin, Stefano; Kauppinen, Risto, Techniques for hiding network element names and addresses.
  384. Ebrahimi, Hashem M.; Carter, Stephen R; Oyler, Mel J, Techniques for managing secure communications.
  385. Chan,Wilson Wai Shun; Chandrasekaran,Sashikanth; Yurek,Tolga, Techniques for multiple window resource remastering among nodes of a cluster.
  386. Kalbag, Rohit, Techniques for providing enhanced network security.
  387. Irudayaraj,Rajkumar; Kunisetty,Sunil, Time-to-live timeout on a logical connection from a connection cache.
  388. Knight, Keith Bryan; Lawwill, Jr., James Winston; Pulito, Brian L., Tunneling non-HTTP traffic through a reverse proxy.
  389. Wesemann, Darren L.; Hull, Joel E.; Jensen, Olaf D, UDP communication with a programmer interface over wireless networks.
  390. Multer, David L.; Garner, Robert E.; Ridgard, Leighton A.; Stannard, Liam J.; Cash, Donald W.; Robertson, Joseph, Updating application data including adding first change log to aggreagate change log comprising summary of changes.
  391. McGhie, Sean I.; Buchheit, Brian K., User interface for the exchange of non-negotiable credits for entity independent funds.
  392. Karandikar, Shrikrishna; Kelly, Thomas J., Using digital certificates to request client consent prior to decrypting SSL communications.
  393. Valencia, Andrew J., Virtual dial-up protocol for network communication.
  394. Valencia, Andrew J., Virtual dial-up protocol for network communication.
  395. Colwill, Jr., Ronald W., Virtual directory.
  396. Colwill, Jr.,Ronald W., Virtual directory.
  397. Boden, Edward B.; Palermo, Donald A., Virtual private network and tunnel gateway with multiple overlapping, remote subnets.
  398. Boden,Edward B.; Palermo,Donald A., Virtual private network and tunnel gateway with multiple overlapping, remote subnets.
  399. Wesemann, Darren L., Virtual private network between computing network and remote device.
  400. Clayton,Tom; Rakes,Richard Bruce, Virtual private network software system.
  401. Nikols, Nick N.; Thurgood, Brent W., Virtual replication for a computer directory system.
  402. Barnes, James D.; O'Connor, Dan; Potluri, Dora, Web log filtering.
  403. Desai,Ajay M.; Lei,Ming; Goell,Ric; Jacobs,Lawrence, Web object access authorization protocol based on an HTTP validation model.
  404. Porcari,Damian, Web-based document system.
  405. Irudayaraj,Rajkumar; Ou,Richard, Weighted attributes on connections and closest connection match from a connection cache.
  406. Onyon, Richard M.; Stannard, Liam J.; Garner, Robert E.; Ridgard, Leighton A., Wireless telephone data backup system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로