$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Techniques for eliminating redundant access checking by access filters 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/163
출원번호 US-0034587 (1998-03-04)
발명자 / 주소
  • Schneider David S.
  • Lipstone Laurence R.
  • Jensen Daniel
  • Ribet Michael B.
출원인 / 주소
  • Internet Dynamics, Inc.
대리인 / 주소
    Nelson
인용정보 피인용 횟수 : 326  인용 특허 : 16

초록

A scalable access filter that is used together with others like it in a virtual private network to control access by users at clients in the network to information resources provided by servers in the network. Each access filter uses a local copy of an access control data base to determine whether a

대표청구항

[ What is claimed is:] [1.] An access filter which is used as one of a plurality of access filters in a network, the access filter serving to make a determination whether a request for access by a user to an information resource will be permitted and the network further including a client from which

이 특허에 인용된 특허 (16)

  1. Tabuki Takaaki,JPX, Authentication method for networks.
  2. Tabuki Takaaki,JPX, Authentication method for networks.
  3. Mihm ; Jr. Thomas J. (Mesa AZ), Authentication system.
  4. Russell Edward A. (Acton MA), Authorization system for obtaining in single step both identification and access rights of client to server directly fro.
  5. Chapman Sydney George,GBX ; Taylor Michael George,GBX, Control of access to a networked system.
  6. Yung Darby (1 Richmond Street West Toronto ; Ontario CAX M5H 1Y8), Controlling access to network resources.
  7. Futral William T. (Hillsboro OR), Dataframe bridge filter with communication node recordkeeping.
  8. Yu Che-Fn (Chelmsford MA), Distributed security procedure for intelligent networks.
  9. Kung Kenneth C. (Cerritos CA), Distributed user authentication protocol.
  10. Belville Daniel R. ; Goble George R., Method and system for allowing remote procedure calls through a network firewall.
  11. Singh Surinder ; St. Pierre Robert P., Method and system for sharing information between network managers.
  12. Holden James M. ; Levin Stephen E. ; Wrench ; Jr. Edwin H. ; Snow ; deceased David W., Mixed enclave operation in a computer network with multi-level network security.
  13. Dobbins Kurt ; Dobbins Kris ; Cormier Len ; Yohe Kevin ; Haggerty William ; Simoneau Paul ; Soczewinski Rich, Network interconnecting apparatus having a separate forwarding engine object at each interface.
  14. Baker Brenda Sue (Berkeley Heights NJ) Grosse Eric (Berkeley Heights NJ), System and method for database access control.
  15. Freund Gregor, System and methodology for managing internet access on a per application basis for client computers connected to the int.
  16. Newton Farrell ; Williams Gareth, User identification and authentication system using ultra long identification keys and ultra large databases of identif.

이 특허를 인용한 특허 (326)

  1. Horvitz, Eric J.; Grudin, Jonathan T.; Dewan, Prasun, Abstractions and automation for enhanced sharing and collaboration.
  2. Horvitz, Eric J.; Grudin, Jonathan T.; Dewan, Prasun, Abstractions and automation for enhanced sharing and collaboration.
  3. Horvitz, Eric J.; Grudin, Jonathan T.; Dewan, Prasun, Abstractions and automation for enhanced sharing and collaboration.
  4. Hannel, Clifford Lee; May, Anthony, Access control.
  5. Kanai, Yoichi, Access control decision system, access control enforcing system, and security policy.
  6. Arai,Masato; Kajiura,Toshinori, Access control system.
  7. Ford,Daniel E., Access control system and method for a networked computer system.
  8. Anil K. Srivastava ; Timothy C. Misner ; Daryl A. Huff, Access control system for an ISP hosted shared email server.
  9. Numao, Masayuki; Kudoh, Michiharu; Amano, Tomio, Access control system, access control method, storage medium and program transmission apparatus.
  10. Sturms,James R.; Thomson,Randy D.; Wang,Ziyi; Ma,Hongzhou, Access trimmed user interface.
  11. Goldman, Jason D; Houck, Peter Thomas; Lachelt, David Jonathan; Roeling, Fredrick M; Stoecker, Paul A, Aggregated policy deployment and status propagation in network management systems.
  12. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  13. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  14. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  15. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  16. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D.; Schmidt, Douglas Charles, Agile network protocol for secure communications with assured system availability.
  17. Munger, Edmund Colby; Schmidt, Douglas Charles; Short, III, Robert Dunham; Larson, Victor; Williamson, Michael, Agile network protocol for secure video communications with assured system availability.
  18. Hoffman, Terry G., Anti-virus protection system and method.
  19. Fleskes, David E., Apparatus and method for automatically generating worldwide web pages based on real world domain data.
  20. Gwiazda, Ronald E.; Sanchez, Spencer S.; Goldstein, Jonah, Apparatus and method for creating and using documents in a distributed computing network.
  21. Jungck, Peder J., Apparatus and method for domain name resolution.
  22. Jungck,Peder J., Apparatus and method for domain name resolution.
  23. Panec, Peter A.; Douglas, Jason Brant, Apparatus and method for generating alert messages in a message exchange network.
  24. Le, Weiliang; Wu, Ju; Ziegler, Philipp; Weisbeck, David Manuel; Wheadon, Blair Thomas, Apparatus and method for generating reports from shared objects.
  25. Robert J. Levay ; Gregory V. Kaiser, Apparatus and method for inserting predetermined packet loss into a data flow.
  26. Sibal,Sandeep; Spatscheck,Oliver; Rodriguez,Pablo, Apparatus and methods for providing translucent proxies in a communications network.
  27. Sibal,Sandeep; Spatscheck,Oliver; Rodriguez,Pablo, Apparatus and methods for providing translucent proxies in a communications network.
  28. Boulos, Thomas Nabiel; Behera, Prasanta Kumar, Application identity design.
  29. Boulos, Thomas Nabiel; Behera, Prasanta Kumar, Application identity design.
  30. Ben-Itzhak, Yuval, Application layer security method and system.
  31. William H. Fitler, Jr. ; Timothy A. Howes ; Bruce L. Steinback, Centralized directory services supporting dynamic group membership.
  32. Farrell, Stephen; dehOra, Bill; Coughlan, Sean; Kelly, Hunter; Lewandowski, Jaroslaw, Challenge-response system and method.
  33. Kaditz, Jeffrey; Kachachi, Bashar J; Soderberg, Joel M., Client health validation using historical data.
  34. Yeager,William J.; Chen,Rita Y.; Soto,Juan C., Collaborative content coherence using mobile agents in peer-to-peer networks.
  35. Feldman, Timothy R; Hughes, James Prescott; Furuhjelm, Martin R, Command sets and functions.
  36. Sato,Eiichi, Communication apparatus and method for discriminating confidentiality of received data.
  37. Madanes, Rodrigo; Sopieva, Natasha Valerie; Nilsson, Linus; Corr, Nick, Communication system.
  38. Tahan,Thomas E., Community access control in a multi-community node.
  39. Uematsu, Akira; Kurashima, Akihisa; Sakata, Kazuhiro; Ichimura, Shigehiro, Content delivery system.
  40. Desai, Bhavesh N.; Shankaranarayanan, Nemmara K.; Shur, David Hilton; Smiljanic, Aleksandra; Totland, Todd J.; Van der Merwe, Jacobus E.; Woodward, Sheryl Leigh, Data service including channel group.
  41. Selman, Daniel; Bergman, Robert; O'Neil, Edward K., Data synchronization.
  42. Selman,Daniel; Bergman,Robert; O'Neil,Edward K., Data synchronization.
  43. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Delegated administration for a distributed security system.
  44. Srinivasan, Sudhir; Zuckerman, Boris; Slutsky, Irina P., Delegations and caching in a distributed segmented file system.
  45. Jones, Kevin Brian; Pointon, Richard, Device internet resource access filtering system and method.
  46. David S. Schneider ; Michael B. Ribet ; Laurence R. Lipstone ; Daniel Jensen, Distributed administration of access to information.
  47. Schneider, David S.; Ribet, Michael B.; Lipstone, Laurence R.; Jensen, Daniel, Distributed administration of access to information and interface for same.
  48. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Distributed enterprise security system.
  49. Markham, Thomas R., Distributed firewall system and method.
  50. Willibeek-LeMair, Marc; Smith, Brian C., Distributed packet flow inspection and processing.
  51. Shimomura,Osamu; Sakai,Hidenori, Document management system.
  52. Shutt,Michael J., Document management system and method.
  53. Salkewicz, William, Domain isolation through virtual network machines.
  54. Salkewicz, William, Domain isolation through virtual network machines.
  55. Salkewicz, William, Domain isolation through virtual network machines.
  56. Salkewicz, William, Domain isolation through virtual network machines.
  57. Salkewicz, William, Domain isolation through virtual network machines.
  58. Salkewicz, William, Domain isolation through virtual network machines.
  59. Salkewicz,William, Domain isolation through virtual network machines.
  60. Salkewicz, William, Dynamic binding of network services.
  61. Salkewicz,William, Dynamic binding of network services.
  62. Dozier, Linda T.; Fish, Edmund J.; Gilburne, Miles R.; Zolt, Nina, Dynamic characterization of nodes in a semantic network for desired functions such as search, discovery, matching, content delivery, and synchronization of activity and information.
  63. Graham, Todd D.; Hudson, Jonathan C., Dynamic file access control and management.
  64. Garvey,Russel Roy; Haze,Thomas Leo; Mueller,Anthony Martin; Tauferner,Andrew Thomas; Zubair,Tanveer, Dynamic storage space linking.
  65. Mancini, Adrian O.; Simzer, Kevin T.; Turnbull, James, Dynamic trust anchor system and method.
  66. Kucherawy,Murray, E-mail system providing filtering methodology on a per-domain basis.
  67. Jungck,Peder J.; Najam,Zahid; Nguyen,Andrew T.; Penke,Ramachandra Rao, Edge adapter apparatus and method.
  68. Jungck,Peder J.; Najam,Zahid; Nguyen,Andrew T.; Penke,Ramachandra Rao, Edge adapter architecture apparatus and method.
  69. Cozart, Dennis; McGuinness, Lorcan; Peterson, Michael, Electronic transactions system.
  70. Frey, Anthony; Bruno, John; Walters, Benjamin; Bassett, Charles; Kim, Jacob Dong Ju, Enabling private data feed.
  71. Beck, Robert L., File sharing administration.
  72. Fields, Duane Kimbell; Hassinger, Sebastian; Hurley, II, William Walter, Filter definition for distribution mechanism for filtering, formatting and reuse of web based content.
  73. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  74. Mahon, Hugh F; Durham, David M; Tang, Puqi, Grouping targets of management policies.
  75. Ho,Mang Rong; Hu,Tawei, High run-time performance method for setting ACL rule for content management security.
  76. Ho, Mang-Rong; Hu, Tawei, High run-time performance system.
  77. Haghpassand, Joshua, Highly accurate security and filtering software.
  78. Ben-Natan, Ron; Segal, Ury, Identifying attribute propagation for multi-tier processing.
  79. Yoda, Akira, Information storing apparatus.
  80. Fox, Barbara L.; LaMacchia, Brian A., Intelligent trust management method and system.
  81. Kenworthy Stacy, Internal network node with dedicated firewall.
  82. Madan, Umesh; Eppley, Geary L.; Wortendyke, David, Inverse query engine systems with cache and methods for cache maintenance.
  83. Roese, John J.; Graham, Richard W.; Frattura, David; Allen, Anja A.; Fee, Brendan J., Location discovery in a data network.
  84. Roese, John J.; Graham, Richard W.; Frattura, David; Harrington, David, Location-based access control in a data network.
  85. Yeager,William J.; Chen,Rita Y., Managing distribution of content using mobile agents in peer-topeer networks.
  86. Bell, Carol A.; Shipley, Michael D.; Hahn, Scott D., Managing policy rules in a network.
  87. Roskind, James A., Master key trust grants and revocations for minor keys.
  88. Roskind, James A., Master key trust grants and revocations for minor keys.
  89. Illg, Jason J.; Murray, Sean; Pisello, John M., Matching entitlement information for multiple sources.
  90. Black, Robert Barth, Method and aparatus for presence based resource management.
  91. McBride, Stephen Larry; Polson, Russell Glen; Davidson, Troy, Method and apparatus for automatically synchronizing data from a host computer to two or more backup data storage locations.
  92. Smith, Michael R., Method and apparatus for best effort propagation of security group information.
  93. Blumenau, Steve; Cohen, Steve; Ofer, Erez, Method and apparatus for determining an identity of a network device.
  94. Fumarolo Arthur L. ; Jackson Brett A., Method and apparatus for dynamically grouping communication units in a communication system.
  95. Kay, James, Method and apparatus for electronic mail filtering.
  96. Kay, James, Method and apparatus for electronic mail filtering.
  97. Kay, James, Method and apparatus for electronic mail filtering.
  98. Rogers,Paul A.; Nierenberg,Nicolas C., Method and apparatus for generating page-level security in a computer generated report.
  99. Blumenau, Steve; Cohen, Steve; Ofer, Erez, Method and apparatus for identifying network devices on a storage network.
  100. Fox, Mark A.; King, Peter F.; Ramasubramani, Seetharaman; Martin, Jr., Bruce K.; Boyle, Stephen S., Method and apparatus for informing wireless clients about updated information.
  101. Mason,Matthew J., Method and apparatus for interacting with a source code control system.
  102. Fox, Mark A.; King, Peter F.; Ramasubramani, Seetharaman, Method and apparatus for maintaining security in a push server.
  103. Mark A. Fox ; Peter F. King ; Seetharaman Ramasubramani, Method and apparatus for maintaining security in a push server.
  104. Samar,Vipin, Method and apparatus for management of encrypted data through role separation.
  105. Blumenau,Steven M.; Fitzgerald,John T.; Madden, Jr.,John F., Method and apparatus for managing access to storage devices in a storage system with access control.
  106. Blumenau,Steven M.; Fitzgerald,John T.; Madden, Jr.,John F., Method and apparatus for managing access to storage devices in a storage system with access control.
  107. Chen, Shigang; Wei, Liman, Method and apparatus for managing security policies on a network.
  108. Black, Robert Barth, Method and apparatus for presence based resource management.
  109. Blumenau,Steven M.; Fitzgerald,John T.; Madden, Jr.,John F., Method and apparatus for preventing unauthorized access by a network device.
  110. Blumenau, Steven M.; Ofer, Erez; Fitzgerald, John T.; McGillis, James M.; Lippitt, Mark C.; Vishlitzsky, Natan, Method and apparatus for providing data management for a storage system coupled to a network.
  111. Stringer Calvert,David W. J.; Lincoln,Patrick D.; Dawson,Steven M., Method and apparatus for providing scalable resource discovery.
  112. Banavar, Guruduth S.; Strom, Robert E.; Sturman, Daniel C.; Tao, Wei, Method and apparatus for summarizing missing events using event stream interpretation.
  113. Jan Thorner SE; Robert Brlenic SE; Henrik Lundgren SE, Method and device for directory services for telecommunication.
  114. Yip, Michael; Merchant, Shehzad T.; Yin, Kenneth T., Method and system for VLAN aggregation.
  115. Yip, Michael; Merchant, Shehzad T.; Yin, Kenneth T.; Knudstrup, Eric, Method and system for VLAN aggregation.
  116. Cheah, Chris, Method and system for controlled distribution of information over a network.
  117. Cheah, Chris, Method and system for controlled distribution of information over a network.
  118. Cheah, Chris, Method and system for controlled distribution of information over a network.
  119. Kanada,Yasusi; O'Keefe,Brian J., Method and system for controlling a policy-based network.
  120. Dozier, Linda; Fish, Edmund J.; Gilburne, Miles R.; Zolt, Nina, Method and system for developing process, project or problem-based learning systems within a semantic collaborative social network.
  121. Patton, Charles; Roschelle, Jeremy; Pea, Roy D.; Vahey, Phil, Method and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment.
  122. Irving, John; Bursztein, Marcello; Mulligan, Steve; Lajeunesse, Patrick; Killeen, Pierre, Method and system for interactive, multi-user electronic data transmission in a multi-level monitored and filtered system.
  123. Irving, John; Bursztein, Marcello; Mulligan, Steve; Lajeunesse, Patrick, Method and system for monitoring and filtering data transmission.
  124. Forman, Ira R.; Holloway, Lane Thomas; Malik, Nadeem; Quiller, Marques Benjamin, Method and system for offloading real-time virus scanning during data transfer to storage peripherals.
  125. Balissat, Joel; Galand, Claude; Le Pennec, Jean Francois; Sommerlatt, Jean Marie, Method and system for securely scanning network traffic.
  126. Balissat, Joel; Galand, Claude; Le Pennec, Jean-Francois; Sommerlatt, Jean-Marie, Method and system for securely scanning network traffic.
  127. Balissat,Joel; Galand,Claude; Le Pennec,Jean Francois; Sommerlatt,Jean Marie, Method and system for securely scanning network traffic.
  128. Balissat,Joel; Galand,Claude; Le Pennec,Jean Francois; Sommerlatt,Jean Marie, Method and system for securely scanning network traffic.
  129. Yip, Michael, Method and system of aggregate multiple VLANs in a metropolitan area network.
  130. Gupta, Arun Kumar, Method for controlling access to information.
  131. Gupta,Arun Kumar, Method for controlling access to information.
  132. Hu, Tawei; Nelson, Kenneth Carlin; Tao, Tracee; Vo, Mimi Phuong Thao; Wang, Yuping, Method for delegation of administrative operations in user enrollment tasks.
  133. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  134. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  135. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  136. Giraud, Jean-Luc; Girard, Pierre, Method for protecting personal data read in a terminal station by a server.
  137. Ben Itzhak, Yuval, Method for the automatic setting and updating of a security policy.
  138. Belissent,Jacques E.; Batty,Frederic C.; Misner,Timothy C.; Huff,Daryl A.; Srivastava,Anil K., Methods and apparatus for providing a virtual host in electronic messaging servers.
  139. O'Toole, Jr., James W., Methods and apparatus for providing data distribution that supports auditing.
  140. Strickland, Zoe Camilla Claire; Iandolo, Raymond J.; Ryan, Kevin J.; Stark, Harold E.; Kendall, Deborah A.; Brannigan, Christopher J., Methods and systems for determining privacy requirements for an information resource.
  141. Khin, Peter Myo; Strickland, Zoë Camilla Claire; Golden, James Leslie; Iandolo, Raymond J.; Ryan, Kevin J., Methods and systems for determining security requirements for an information resource.
  142. Michael Rosenfelt ; Mark Gonzales, Methods of providing computer systems with bundled access to restricted-access databases.
  143. Chen, Xiaobao; Kriaras, Ioannis; Paparella, Andrea, Mobile IP supporting quality of service.
  144. Yeager, William J.; Chen, Rita Y., Mobile agents in peer-to-peer networks.
  145. Arsenault, David, Modifying browser requests to track browsing activities.
  146. Docter Eric E. ; Hofmann William D. ; Hurley Paul E., Multi-stage data filtering system employing multiple filtering criteria.
  147. Bhandarkar, Mangesh P.; Dewey, Michael K., Multiple stakeholders for a single business process.
  148. Balissat, Joel; Galand, Claude; Le Pennec, Jean Francois; Sommerlatt, Jean Marie, Multipoint server for providing secure, scaleable connections between a plurality of network devices.
  149. Balissat,Joel; Galand,Claude; Le Pennec,Jean Francois; Sommerlatt,Jean Marie, Multipoint server for providing secure, scaleable connections between a plurality of network devices.
  150. Kenworthy, Stacy, Network attached device with dedicated firewall security.
  151. Kenworthy, Stacy, Network attached device with dedicated firewall security.
  152. Sood, Kapil; Maciocco, Christian, Network interface apparatus.
  153. Ben-Natan, Ron, Network intrusion blocking security overlay.
  154. Porras, Phillip Andrew; Valdes, Alfonso De Jesus, Network surveillance.
  155. Ben-Natan, Ron, Nondestructive interception of secure data in transit.
  156. Feldman, Timothy R; Hughes, James Prescott; Furuhjelm, Martin R, Object-based commands and functions.
  157. Feldman, Timothy R; Hughes, James Prescott; Furuhjelm, Martin R, Object-based commands with access control identifiers.
  158. Feldman, Timothy R; Hughes, James Prescott; Furuhjelm, Martin R, Object-based commands with data integrity identifiers.
  159. Feldman, Timothy R; Hughes, James Prescott; Furuhjelm, Martin R, Object-based commands with quality of service identifiers.
  160. Dozier, Linda T.; Fish, Edmund J.; Zolt, Nina; Gilburne, Miles R., Object-based system and language for dynamic data or network interaction including learning management.
  161. Graham, Richard W.; Roese, John J., Optical interface identification system.
  162. Truong, Phong Kim; Wang, Eileen HongLian, Optimizing a compiled access control table in a content management system.
  163. Barbir, Abdulkadev; Mistry, Nalin; Ding, Wayne; Penno, Reinaldo, Overlay networks.
  164. Yeager,William J.; Chen,Rita Y., Peer trust evaluation using mobile agents in peer-to-peer networks.
  165. Traversat, Bernard A.; Slaughter, Gregory L.; Saulpaugh, Thomas E.; Abdelaziz, Mohamed M.; Duigou, Michael J.; Pouyoul, Eric; Hugly, Jean-Christophe; Gong, Li; Yeager, William J.; Joy, William N.; Clary, Michael J., Peer-to-peer network computing platform.
  166. Sastry,Ambatipudi R.; Ogier,Richard G., Per hop behavior for differentiated services in mobile ad hoc wireless networks.
  167. Jalava, Mika; Syvänne, Tuomo, Personalized firewall.
  168. Mangan,John F., Policy based routing system and method for caching and VPN tunneling.
  169. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Policy inheritance through nested groups.
  170. Yeager, William J.; Chen, Rita Y., Presence detection using mobile agents in peer-to-peer networks.
  171. Arsenault, David, Processing browser requests based on trap lists.
  172. Arsenault, David, Processing browser requests to provide multiple portions of content having a consistent appearance.
  173. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Processing data using information embedded in a data request.
  174. Arsenault, David, Processing selected browser requests.
  175. Arsenault, David, Processing selected browser requests.
  176. Yeager,William J.; Chen,Rita Y., Propagating and updating trust relationships in distributed peer-to-peer networks.
  177. Hendren, III, C. Hudson, Providing a network communication status description based on user characteristics.
  178. Chaurasia, Ashish; Jujjuri, Venkateswararao; Lanjewar, Ujjwal, Providing access in a distributed filesystem.
  179. Dettinger, Richard D.; Kolz, Daniel P., Query conditions-based security.
  180. Dettinger, Richard D.; Kolz, Daniel P., Query conditions-based security.
  181. Dettinger, Richard D.; Kolz, Daniel P., Query conditions-based security.
  182. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  183. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  184. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  185. Earnest, Jerry Brett, Redundant email address detection and capture system.
  186. Edward Doutre ; John Christian Fluke, Replacement of substrings in file/directory pathnames with numeric tokens.
  187. Yeager,William J.; Chen,Rita Y., Representing trust in distributed peer-to-peer networks.
  188. Nash, Alistair, Resource access filtering system and database structure for use therewith.
  189. Nagar, Vivek; Singh, Inderjeet, Scalable proxy servers with plug-in filters.
  190. Ogier,Richard G.; Sastry,Ambatipudi R., Scheduling mechanisms for use in mobile ad hoc wireless networks for achieving a differentiated services per-hop behavior.
  191. Ristock, Herbert Willi Artur; Perlmutter, S. Michael; Galvin, Brian, Scoring persons and files for trust in digital communication.
  192. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Secure data exchange.
  193. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Secure data exchange based on request destination.
  194. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S.; Hendren, III, C. Hudson, Secure data exchange between data processing systems.
  195. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Secure data exchange between data processing systems.
  196. Harada,Larry T.; Dolecki,Mark A.; Purdum,Christopher S.; Hendren, III,C. Hudson, Secure data exchange between date processing systems.
  197. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Secure data exchange for processing requests.
  198. Boulos, Thomas Nabiel; Behera, Prasanta Kumar, Secure identity federation for non-federated systems.
  199. Boulos, Thomas Nabiel; Behera, Prasanta Kumar, Secure identity federation for non-federated systems.
  200. Abbondanzio, Antonio; Pruett, Gregory B., Securing a server before connecting the server to a data communications network.
  201. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Security control module.
  202. Zömbik, Lászlo; Huszár, Géza János; Milenovic, Aleksandar, Security information for updating an authorization database in managed networks.
  203. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Security provider development model.
  204. Kira Sterling Attwood ; James Russell Godwin ; Linwood Hugh Overby, Jr. ; Brian Sean Perry ; David John Wierbowski, Security rule database searching in a network security environment.
  205. Godwin, James Russell; Jones, David Andrew; Overby, Jr., Linwood Hugh; Wenklar, Richard Allen, Security rule processing for connectionless protocols.
  206. Tominaga, Hiroyuki; Sato, Yoshiharu, Security system for electronic information sharing.
  207. Garg, Praerit; Dyke, Cliff Van; Jaganathan, Karthik; Pustilnik, Mark; Schmidt, Donald E., Selective cross-realm authentication.
  208. Garg, Praerit; Van Dyke, Cliff; Jaganathan, Karthik; Pustilnik, Mark; Schmidt, Donald E., Selective cross-realm authentication.
  209. Ben-Natan, Ron; Tarandach, Izar, Selective local database access restriction.
  210. Dinh,Hung T.; Gilkey,Jerry Andrew; Goal,Patrick M.; Lakhdhir,Mansoor A.; Nadrendra,Reddy; Tran,Ky, Self service single sign on management system allowing user to amend user directory to include user chosen resource name and resource security data.
  211. Frattura, David E., Status transmission system and method.
  212. Syvanne,Tuomo; Jalava,Mika, Synchronization of security gateway state information.
  213. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  214. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  215. Griffin,Philip B., System and method for XML data representation of portlets.
  216. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  217. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  218. Moriconi,Mark S.; Godik,Simon; Xu,Mingde; Yagen,Ken, System and method for analyzing security policies in a distributed computer network.
  219. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J.; Mesdaq, Ali A., System and method for analyzing web content.
  220. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A., System and method for analyzing web content.
  221. Baddour, Victor L; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A, System and method for analyzing web content.
  222. Jolley,Chris; Giridhar,Sathyanarayana; Griffin,Philip B.; Howes,Jason; O'Neil,Edward K.; Patadia,Jalpesh, System and method for application flow integration in a portal framework.
  223. Chen,An Feng I; Hu,Tawei; Liang,Lily; Lin,Jy Jine James; Perry,Edward Joseph; Wang,Yuping; Yaung,Alan Tsu I; Zhang,Howard Hao, System and method for configurable binding of access control lists in a content management system.
  224. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  225. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  226. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  227. Belani, Eshwar; Katiyar, Dinesh; Garg, Suneet, System and method for controlling access to resources in a distributed environment.
  228. Belani, Eshwar; Katiyar, Dinesh; Garg, Suneet, System and method for controlling access to resources in a distributed environment.
  229. Hubbard, Daniel Lyle; Ruskin, Dan, System and method for dynamic and real-time categorization of webpages.
  230. Lobo, Hubert; Jacob, Kurien, System and method for electronic submission, procurement, and access to highly varied material property data.
  231. Lobo, Hubert; Jacob, Kurien, System and method for electronic submission, procurement, and access to highly varied test data.
  232. McFall, Michael E.; Sturmer, Carl; Graves, Kelly, System and method for enabling a hierarchal collaboration of devices across a communication channel.
  233. Nelson, Kenneth Carlin; Noronha, Marilene Araujo, System and method for ensuring security with multiple authentication schemes.
  234. Nelson,Kenneth Carlin; Noronha,Marilene Araujo, System and method for ensuring security with multiple authentication schemes.
  235. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing a communication link.
  236. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing an encrypted communication link based on IP address lookup requests.
  237. Kaufman, Michael Philip; Silverman, Micah Philip, System and method for generating automatic user interface for arbitrarily complex or large databases.
  238. Kaufman, Michael Philip; Silverman, Micah Philip, System and method for generating automatic user interface for arbitrarily complex or large databases.
  239. Kaufman,Michael Philip; Silverman,Micah Philip, System and method for generating automatic user interface for arbitrarily complex or large databases.
  240. Adams, Carlisle, System and method for granting security privilege in a communication system.
  241. Swander, Brian D.; Aboba, Bernard D., System and method for improved network security.
  242. Choy,David Mun Hien; Hu,Tawei; Lin,Jy Jine James; Wang,Yuping; Yaung,Alan Tsu I, System and method for incremental refresh of a compiled access control table in a content management system.
  243. Moriconi,Mark S.; Godik,Simon; Xu,Mingde; Yagen,Ken, System and method for incrementally distributing a security policy in a computer network.
  244. Moriconi,Mark; Qian,Shelly, System and method for maintaining security in a distributed computer network.
  245. Chen, An Feng-I; Choy, David Mun-Hien; Hu, Tawei; Lin, Jy-Jine James; Nelson, Kenneth Carlin; Wang, Yuping; Yaung, Alan Tsu-I, System and method for managing application specific privileges in a content management system.
  246. Burns, Randal Chilton; Long, Darrell, System and method for managing authentication and coherency in a storage area network.
  247. Haut,John; Griffin,Philip B.; Patadia,Jalpesh; Willcox,Steven; Breeden,Timothy, System and method for portal page layout.
  248. Jungck, Peder J., System and method for processing packets according to concurrently reconfigurable rules.
  249. Jungck, Peder J., System and method for processing packets according to user specified rules governed by a syntax.
  250. Jungck,Peder J., System and method for processing packets using location and content addressable memories.
  251. Schmeling,Garth F.; Cherry,Darrel D., System and method for providing customized secure access to shared documents.
  252. McVeigh, Ryan Sean; Roth, Steven L.; Patadia, Jalpesh; Saarva, Tanya; Zhou, Xiaojiang; Posner, Brad, System and method for providing nested types for content management.
  253. Commons, Richard, System and method for restricting internet access of a computer.
  254. Griffin,Philip B.; Devgan,Manish; Howes,Jason; Dunbar,Scott, System and method for rule-based entitlements.
  255. Clark, Paul, System and method for secure communication between domains.
  256. Clark, Paul C., System and method for secure communication between domains.
  257. Clark, Paul C., System and method for secure communication between domains.
  258. Hanzlik, Robert Otto; Lowe, Geoffrey A.; Markham, Thomas R.; Meredith, Lynn Marquette, System and method for secure group communications.
  259. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for using a registered name to connect network devices with a link that uses encryption.
  260. Mi, James; Parikh, Vishesh; Teng, Albert, System and method for using internet based caller ID for controlling access to an object stored in a computer.
  261. Hubbard, Dan; Tse, Alan, System and method of analyzing web addresses.
  262. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  263. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  264. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  265. Hubbard, Dan, System and method of controlling access to the internet.
  266. Dozortsev, D'mitri, System and method of enforcing executable code identity verification over the network.
  267. Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph; Kester, Harold M., System and method of monitoring and controlling application files.
  268. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  269. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  270. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  271. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  272. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  273. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  274. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  275. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  276. Kester, Harold M.; Kester Jones, legal representative, Nicole; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  277. Kester,Harold M.; Hegli,Ronald B.; Dimm,John Ross; Anderson,Mark Richard, System and method of monitoring and controlling application files.
  278. Herrmann, Conrad K.; Baharestan, Kaveh; Bentley, Joseph E.; Leroy, Jess A., System and methods providing anti-virus cooperative enforcement.
  279. Tonouchi,Toshio, System for and a method of providing an online time period reserving service, which can protect an excessive load from being applied to a communication system, in order to provide a stable communicat.
  280. Cheah, Chris, System for controlled distribution of user profiles over a network.
  281. Cheah, Chris, System for controlled distribution of user profiles over a network.
  282. Carroll, Nicholas M., System for protecting domain system configurations from users with local privilege rights.
  283. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  284. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  285. Sinclair, John W.; Pettener, Ian James; Nash, Allstair H., System, method and apparatus for use in monitoring or controlling internet access.
  286. Kaufman, Michael Philip; Silverman, Micah Philip, Systems and methods for automatically generating user interface elements for complex databases.
  287. Larson, Victor, Systems and methods for certifying devices to communicate securely.
  288. Larson, Victor, Systems and methods for certifying devices to communicate securely.
  289. Larson, Victor, Systems and methods for certifying devices to communicate securely.
  290. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Systems and methods for connecting network devices over communication network.
  291. Lim, Cheow Guan; Schaecher, Stephan, Systems and methods for cryptographically enhanced automatic blacklist management and enforcement.
  292. Lim, Cheow Guan; Schaecher, Stephan; Fischer, Wieland; Meyer, Bernd, Systems and methods for device and data authentication.
  293. Lim, Cheow Guan; Schaecher, Stephan; Fischer, Wieland; Meyer, Bernd, Systems and methods for device and data authentication.
  294. Lim, Cheow Guan; Schaecher, Stephan; Fischer, Wieland; Meyer, Bernd, Systems and methods for device and data authentication.
  295. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  296. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  297. Eppley,Ceary L.; Madan,Umesh; Wortendyke,David, Systems and methods for filter processing using hierarchical data and data structures.
  298. Palmeri, Ron; Reese, David Byrne, Techniques for providing interoperability as a service.
  299. Larson, Victor, Third party VPN certification.
  300. Larson, Victor, Third party VPN certification.
  301. Larson, Victor, Third party VPN certification.
  302. Larson, Victor, Third party VPN certification.
  303. Larson, Victor, Third party VPN certification.
  304. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of network access to an application.
  305. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of network access to an application.
  306. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of services over a network.
  307. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of services over a network.
  308. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of services over a network.
  309. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of services over a network.
  310. Hursey, Neil John; McEwan, William Alexander, Tree pattern system and method for multiple virus signature recognition.
  311. Ristock, Herbert Willi Artur; Galvin, Brian; Perlmutter, S. Michael; Ryabchun, Andriy Vladimirovich, Trust conferencing apparatus and methods in digital communication.
  312. Roskind,James A., Trust grant and revocation from a master key to secondary keys.
  313. Ristock, Herbert Willi Artur; Galvin, Brian; Perlmutter, S. Michael; Ryabchun, Andriy; Fedorov, Sergey, Trust in physical networks.
  314. Yeager,William J.; Chen,Rita Y., Trust mechanisms for a peer-to-peer network computing platform.
  315. Hanna,Stephen R.; Anderson,Anne H.; Elley,Yassir K.; Perlman,Radia J.; Mullan,Sean J., Trust ratings in group credentials.
  316. Yeager,William J.; Chen,Rita Y., Trust spectrum for certificate distribution in distributed peer-to-peer networks.
  317. Ristock, Herbert Willi Artur; Perlmutter, S. Michael; Galvin, Brian, Trust-interactive communication applications.
  318. Hannel, Clifford Lee; May, Anthony, Tunneling using encryption.
  319. Blumenau, Steve; Cohen, Steve; Lindholm, Jason D.; Ofer, Erez, User interface for managing storage in a storage system coupled to a network.
  320. Singh, Inderpreet; McCann, Benjamin, VPN failure recovery.
  321. Roese, John J.; Graham, Richard W.; Frattura, David; Harrington, David, Verified device locations in a data network.
  322. Boden, Edward B.; Palermo, Donald A., Virtual private network and tunnel gateway with multiple overlapping, remote subnets.
  323. Boden,Edward B.; Palermo,Donald A., Virtual private network and tunnel gateway with multiple overlapping, remote subnets.
  324. Daude, Olivier; Fieschi, Jacques; Galand, Claude; Hericourt, Olivier; Le Pennec, Jean Francois, Virtual private network crossovers based on certificates.
  325. Porcari,Damian, Web-based document system.
  326. Choi, Jin-hyeon; Shin, Sang-hyun, Wireless network apparatus storing authentication information in multiple formats and areas and authentication method of the same.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로