$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for secure communications 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H06F-001/24
출원번호 US-0086888 (1998-05-29)
발명자 / 주소
  • Lincke Scott D.
  • Marianetti
  • II Ronald
출원인 / 주소
  • Palm, Inc.
대리인 / 주소
    Mahamedi
인용정보 피인용 횟수 : 303  인용 특허 : 67

초록

A communications system and methods for securely transmitting a message between a wireless client and a proxy server are provided. A method for transmitting a message from the wireless client to a proxy server is provided. The message includes at least one packet of data and is encrypted using a dat

대표청구항

[ What is claimed is:] [1.]1. A method for securely transmitting a message from a wireless client, the method comprising:encrypting a local key using a public key to form an encrypted local key, the local key corresponding to a request to contact a proxy server;encrypting the message using the local

이 특허에 인용된 특허 (67)

  1. Queen Cary L. (Rockville MD), Apparatus and method for comparing data groups.
  2. Skeen Marion D. (San Francisco CA) Bowles Mark (Woodside CA), Apparatus and method for providing decoupling of data exchange details for providing high performance communication betw.
  3. Slaughter ; III Frank G. (Weston MA) Gocht Russell C. (Bedford MA) McCool David (Tewskbury MA), Apparatus and method for providing remote users with the same unique IP address upon each network access.
  4. Huang Chu-Yi ; Tso Michael Man-Hak, Application independent e-mail synchronization.
  5. Man-Hak Tso Michael, Application independent record level synchronization.
  6. Everson Rhonda S. (Houston TX) Felix Michael R. (Houston TX) Robertson Boyd D. (League City TX), Asynchronous replication of data changes by distributed update requests.
  7. Zachery Leon (Watertown MA), Automatic document format conversion in an electronic mail system based upon user preference.
  8. Robinson Kurt B. (Newcastle CA) Elbert Dale K. (Citrus Heights CA) Levy Markus A. (Citrus Heights CA), Block-erasable non-volatile semiconductor memory which tracks and stores the total number of write/erase cycles for each.
  9. Shimada Shigeru (Kodaira JPX) Suzuki Kazuyuki (Toride JPX) Yamamoto Naoki (Funabashi JPX) Chikada Nobuyuki (Tama JPX) Takei Sirou (Konosu JPX), Database system and matching method between databases.
  10. Dauerer Norman J. (Hopewell Junction NY) Kelley Edward E. (Wappingers Falls NY), Database system for facilitating comparison of related information stored in a distributed resource.
  11. Lynn Kerry Eugene ; Oppenheimer Alan ; Ritter Michael Walker ; Zweig Jonathan Marcus ; Mullins Jeffery L., Dynamic address assignment in an arbitrarily connected network.
  12. Robinson Kurt B. (Newcastle CA) Elbert Dale K. (Citrus Heights CA) Levy Markus A. (Citrus Heights CA), File structure for a non-volatile block-erasable semiconductor flash memory.
  13. Fukumura Masaaki (Iruma JPX), File update apparatus for generating a matrix representing a subset of files and the update correspondence between direc.
  14. Yoshizawa Satoshi (Kawasaki JPX) Ueda Hirotada (Kokubunji JPX) Matsushima Hitoshi (Tachikawa JPX), Guidance method and apparatus upon a computer system.
  15. Rusis Edvin A. (El Segundo CA), Heterogeneous data translation system.
  16. Brewer ; III Glenn A. (Menlo Park CA) Crim Christopher L. (San Jose CA) Chen Paul S. (Milpitas CA) Lu Frank K. (Milpitas CA), Interface for arranging order of fields.
  17. Terada Hiroaki (Osaka JPX) Nishikawa Hiroaki (Osaka JPX) Sakuta Yoshio (Oaka JPX) Nishikawa Youichiro (Hyogo JPX) Hara Shuji (Osaka JPX) Inaoka Yoshie (Hyogo JPX) Yamasaki Tetsuo (Hyogo JPX) Shima Ke, Manipulating data in a relational data base having operational manipulations defined in an input table and displayed res.
  18. Perlman Radia J. ; Castagnoli Neal D., Mechanism for efficiently synchronizing information over a network.
  19. Chen Cheng T. (Marlboro NJ) Best Reginald P. (Somerset NJ) Brennan Daniel M. (Hillsdale NJ), Method and apparatus for asynchronous PPP and synchronous PPP conversion.
  20. Palmer James E. (Redwood City CA) Powers ; III John R. (Monte Sereno CA) Coleman Patricia J. (Menlo Park CA) Brewer Gregory S. (Pleasanton CA) Herman Jeffrey A. (Palo Alto CA) Cochran Eli (Menlo Park, Method and apparatus for providing visual cues in a graphic user interface.
  21. Kar Rabindra P. ; Reese Kenneth W., Method and apparatus for synchronizing communications between networked computers.
  22. Kucala Gregory R., Method and apparatus for synchronizing information on two different computer systems.
  23. Alston ; Jr. Lawrence E. (Framingham MA) Farrell ; III John J. (Lowell MA) Quayle ; III Kenneth W. (Stow MA), Method and apparatus for transforming objects in data models.
  24. Yeh Keming W. (43765 Abeloe Ter. Fremont CA 94539), Method and apparatus for using a software configurable connector to connect a palmtop computer having a custom port to a.
  25. Webster ; III John W. (Apex NC), Method and apparatus for visually comparing files in a data processing system.
  26. Koss Michael C. (Bothell WA), Method and system for aggregating tables having dissimilar formats.
  27. Smith Mary V. ; Frost Mark D., Method and system for diagnosing and reporting failure of a vehicle emission test.
  28. Cuomo Gennaro A. ; Nguyen Binh Q. ; Nguyen Hung D. ; Singhal Sandeep K., Method and system for portably enabling awareness, touring, and conferencing over the world-wide web using proxies and s.
  29. Poling William F. (Beaverton OR), Method and system for updating files of a plurality of storage devices through propogation of files over a nework.
  30. Cree Charles M. N. (Austin TX) Landry Grady J. (Austin TX) Scully Keith J. (Austin TX) Singh Harinder S. (Boca Raton FL), Method for automatically reconciling entries on two copies of independently maintained electronic calendars.
  31. George Johann (Holland Landing NJ CAX) Thompson Trevor J. (New Providence NJ) Conroy David G. (Maynard MA) Tudor Frederick H. (Evanston IL), Method for canonical ordering of binary data for portable operating systems.
  32. Crozier Keith (Acton MA), Method for mapping, translating, and dynamically reconciling data between disparate computer platforms.
  33. Anderson Thomas P. (Cupertino CA), Method for reconciling entries in a plurality of schedules.
  34. Feigen Ronald Glen (Mesa AZ) Lambert Paul Aerick (Scottsdale AZ), Method for secure network access via message intercept.
  35. Alley Peter E. ; Smith Walter R., Method for synchronizing and archiving information between computer systems.
  36. Daniell Thomas P. (Palo Alto CA) Harding ; Jr. Robert C. (Cupertino CA) Lewis Neil J. (Oakland CA) Nauckhoff Sven H. H. (San Jose CA), Method for the dynamic replication of data under distributed system control to control utilization of resources in a mul.
  37. Arndt Manfred Ruediger ; Actis Frank John, Method of configuring a valid IP address and detecting duplicate IP addresses in a local area network.
  38. Scully Keith J. (Austin TX) Singh Harinder S. (Chapel Hill NC), Method of exchanging entries from a plurality of different electronic calendars based on interactively entered criteria.
  39. Malcolm Jerry W. (Austin TX), Method of selectively transferring video displayed information.
  40. Mighdoll Lee S. ; Leak Bruce A. ; Perlman Stephen G. ; Goldman Phillip Y., Method of transcoding documents in a network environment using a proxy server.
  41. Jackson ; Jr. Kirby Bryan, Methods, systems and computer program products for transferring files from a data processing server to a remote/mobile.
  42. Shuen Pauline (Palo Alto CA), Mobile networking method and apparatus.
  43. Perkins Charles E. (Peekskill NY), Network address management for a wired network supporting wireless communication to a plurality of mobile users.
  44. Kelley Edward Emile ; Armbrust Daniel J., On-line hierarchical form records identification.
  45. Clough William A. (Ontario CAX) Ouelette Daneil (St. Luc Quebec CAX) Sablonniere Serge De La (Ville d\Anjou CAX), Portable computer with touch screen and computer system employing same.
  46. Kelly Douglas J. (320 Bowling Green Dr. Costa Mesa CA 92626), Portable data storage and editing device.
  47. Rodwin Andrew S. ; Wenocur Jonathan H. ; Feinstein Michael G., Remote access apparatus and method which allow dynamic internet protocol (IP) address management.
  48. Johnson Donavon W. (Georgetown) Loucks Larry K. (Austin) Sauer Charles H. (Austin) Smith Todd A. (Austin TX), Single system image uniquely defining an environment for each user in a data processing system.
  49. Blakely Frank W. (Roseville CA) Hall Guy T. (Loomis CA) Winkleblack Sherry (Orangevale CA) Scaccia Jim (Roseville CA) Iwamoto Shinichi (Ohmiya JPX) Nojiri Minoru (Zushi CA JPX) Umezawa Yukihiko (Sacr, Software program for providing cooperative processing between personal computers and a host computer.
  50. Kalajan Kevin E., Source address directed message delivery.
  51. Boothby David J. (Nashua NH), Synchronization of disparate databases.
  52. Brunson Gordon Richards (Broomfield CO), Synchronization of mailboxes of different types.
  53. Wright ; Jr. Gerald V. (San Diego CA), System and method for completing an electronic form.
  54. Whalen Jon S. ; Whittington David ; Zabolotzky Scott ; Zurcher Rodd ; Biersach David, System and method for delivery of information over narrow-band communications links.
  55. Shaheen Amal A. (Austin TX) Yellepeddy Krishna K. (Austin TX), System and method for maintaining replicated data coherency in a data processing system.
  56. Pepe David Mathew (Middletown NJ) Blitzer Lisa B. (Manalapan NJ) Brockman James Joseph (Perrineville NJ) Cruz William (Eatontown NJ) Hakim Dwight Omar (Matawan NJ) Hovey Richard Reid (Somerville NJ) , System and method for providing protocol translation and filtering to access the world wide web from wireless or low-ban.
  57. King Dianne L. (Raleigh NC) Whisler John W. (Raleigh NC), System and method for reading and writing disks formatted for an operating system foreign to the host computer.
  58. Frid-Nielsen Martin (Santa Cruz CA) Schwartz Richard L. (Paris CA FRX) Boye Steven R. (Los Gatos CA), System and methods for appointment reconciliation.
  59. Clark Ted H. (Houston TX) Malisewski Steven C. (Cypress TX) Cooper Patrick R. (Houston TX) Crosswy William Caldwell (Spring TX) Crochet Larry J. (Houston TX), System for automatic synchronization of common file between portable computer and host computer via communication channe.
  60. Kuechler William L. (3 Rum Row Hilton Head SC 29928) Kuechler David W. (3 Rum Row Hilton Head SC 29928), System for storing and manipulating information in an information base.
  61. Lazaridis Mihal,CAX ; Lewis Allan,CAX ; Gilhuly Barry,CAX ; Mousseau Gary,CAX, System for transmitting data files between computers in a wireless environment utilizing a file transfer agent executin.
  62. Kikinis Dan, System in which a Proxy-Server translates information received from the Internet into a form/format readily usable by lo.
  63. Scott Roderick Keith (Durham NC) Tai Ling-Ching Wang (Cary NC), Systems and methods for synchronizing databases in a receive-only network.
  64. Skinner Gary R. (515 Seventeen Mile Dr. Pacific Grove CA 93950) Lehman Michael G. (345 Almond Ave. Los Altos CA 94022), Time and work tracker.
  65. Thompson Bruce A. (Highlands Ranch CO) Van Maren David J. (Ft. Collins CO) McCarthy John G. (Thornton CO) Purcell R. Andrew (Ft. Collins CO) Rottinghaus Michael (Greeley CO), Transparent peripheral file systems with on-board compression, decompression, and space management.
  66. Cary Richard W. (Los Gatos CA) Guyon Richard D. (Mountain View CA), Version management system using plural control fields for synchronizing two versions of files in a multiprocessor system.
  67. Blackwell ; Jr. William C. ; Alston Robin,GBX ; Farrington Kevin M., Web application server with secure common gateway interface.

이 특허를 인용한 특허 (303)

  1. Kumar, Srinivas; Bettadapura, Vijayashree S.; Shah, Shadab Munam, Access, priority and bandwidth management based on application identity.
  2. Chandrashekar, Sridhar; Rogerson, Dale E.; McRoberts, J. Shane; Dong, Wenlong; Reddish, Andrew D., Activating content based on state.
  3. Kuhn, Brian Gerald, Activation of mobile computing device.
  4. Skinner, Craig S., Activation of mobile computing device on a cellular network.
  5. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  6. Rose, Gregory Gordon; Semple, James; Quick, Roy Franklin, Apparatus and method for a secure broadcast system.
  7. Minear, Brian; Yu, Julie; Oliver, Mitchell B.; Lundblade, Laurence; Horel, Gerald C.; Patwari, Jaiteerth, Application-based value billing in a wireless subscriber network.
  8. Bender, Christopher Lyle; Russell, Graham; Silvanovich, Natalie Michelle, Associating services to perimeters.
  9. Bender, Christopher Lyle; Russell, Graham; Silvanovich, Natalie Michelle, Associating services to perimeters.
  10. Horel, Gerald Charles; Klein, Michelle; Nguyen, Phil Tien, Automated account mapping in a wireless subscriber billing system.
  11. Sima, Caleb, Automated user interaction in application assessment.
  12. Samuels, Allen R.; Sutter, Paul G.; Plamondon, Robert D., Automatic LAN/WAN port detection.
  13. Samuels, Allen R.; Sutter, Paul G., Automatic detection and window virtualization for flow control.
  14. Samuels, Allen R.; Sutter, Paul G., Automatic detection and window virtualization for flow control.
  15. McGrew,David A., Avoiding server storage of client state.
  16. McGrew,David A., Avoiding server storage of client state.
  17. Behrens, Ralph; Volker, Kuz; Koeppen, Jan; Lappe, Dirk, Browser enabled wireless communication system having encoded parameters for transmission.
  18. Dunagan, John; Dubrovsky, Opher; Esmeir, Saher; Reis, Charles S; Wang, Jiahe Helen, Browser protection module.
  19. Lillie, Terrance L.; Wiedmann, Christian; Zeljko, Robert; Sneiderman, Richard P.; Wiedmann, Ulrich; Chu, Gigi C.; Lynch, Sean R., Captive portal system and method for use in peer-to-peer networks.
  20. Boyer, John M.; Trakhtenberg, Vladimir, Capturing user interface switch states.
  21. Satyavolu, Ramakrishna, Categorization of summarized information.
  22. Montenegro, Gabriel E., Chained registrations for mobile IP.
  23. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  24. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  25. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  26. Takagaki,Keiichi; Yokota,Hiroshi; Gotoh,Yukie; Tsuji,Atsuhiro; Tamai,Masaaki, Communication device, communication system, and algorithm selection method.
  27. Jackson, Christopher J.; Hagersten, Erik E., Communication error reporting mechanism in a multiprocessing computer system.
  28. Pollutro, Dennis Vance; Almquist, Andrew, Computer security system.
  29. Pollutro, Dennis Vance; Tran, Kiet Tuan; Kumar, Srinivas, Computer security system.
  30. Pollutro, Dennis Vance; Tran, Kiet Tuan; Kumar, Srinivas, Computer security system.
  31. Porzio, Matthew A.; Fieweger, James Andrew, Computerized method and system for managing a community facility in a networked secure collaborative exchange environment.
  32. Porzio, Matthew A.; Fieweger, James Andrew, Computerized method and system for managing a community facility in a networked secure collaborative exchange environment.
  33. Fieweger, James Andrew, Computerized method and system for managing amendment voting in a networked secure collaborative exchange environment.
  34. Huang, William; Rozin, Liviu; Fieweger, James Andrew, Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment.
  35. Huang, William; Rozin, Liviu; Fieweger, James Andrew, Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment.
  36. Huang, William; Rozin, Liviu; Fieweger, James Andrew, Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment.
  37. Huang, William; Rozin, Liviu; Fieweger, James Andrew, Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment.
  38. Ford, Christopher; Callison, Wade; Siddiqui, Fahim; Hakhinian, Mushegh, Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment.
  39. Ford, Christopher Todd; Callison, Wade; Siddiqui, Fahim; Hakhinian, Mushegh, Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment with customer managed keys.
  40. Ford, Christopher Todd; Callison, Wade; Siddiqui, Fahim; Hakhinian, Mushegh, Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment with customer managed keys.
  41. Meyer, Jerry Lee; Durairaj, Sudhakar; Hakhinian, Mushegh, Computerized method and system for managing secure mobile device content viewing in a networked secure collaborative exchange environment.
  42. Landfeldt,Bjorn; Seneviratne,Aruna; Gunningberg,Per; Ardon,Sebastien; Portmann,Marius; Ismailov,Yuri, Creating distributed proxy configurations.
  43. McGrew, David A.; Shore, Melinda L., Cryptographic peer discovery, authentication, and authorization for on-path signaling.
  44. McGrew,David A.; Shore,Melinda L., Cryptographic peer discovery, authentication, and authorization for on-path signaling.
  45. Skuratovich, Uladzimir A.; Kumar, Namendra; Belenko, Andrey; Moore, Timothy Mark, Data compression for communications signalling.
  46. Horel, Gerald; Yu, Julie; Truitt, Robert J., Data synchronization interface.
  47. Rolf, Devon A., Digital media distribution system.
  48. Rolf, Devon A., Digital media distribution system and method.
  49. Longé, Michael R.; Palmer, Brian H.; Hullfish, Keith Charles; Brams, Doug, Directional input system with automatic correction.
  50. Bruck, Jehoshua; Bohossian, Vasken; Fan, Chenggong; LeMahieu, Paul; Love, Philip, Distributed server cluster for controlling network traffic.
  51. Bruck, Jehoshua; Bohossian, Vasken; Fan, Chenggong Charles; LeMahieu, Paul; Love, Philip, Distributed server cluster with graphical user interface.
  52. Bruck, Jehoshua; Bohosslan, Vasken; Fan, Chenggong; LeMahieu, Paul; Love, Philip, Distributed traffic controller for network data.
  53. Bruck,Jehoshua; Bohossian,Vasken; Fan,Chenggong; LeMahieu,Paul; Love,Philip, Distributed traffic controller for network data.
  54. Cardamore, Daniel; May, Darrell Reginald; Nagarajan, Sivakumar; Cherry, Carl Lloyd, Dynamically generating perimeters.
  55. Samuels, Allen; Sutter, Paul, Early generation of acknowledgements for flow control.
  56. Meyer, Jerry Lee, Email effectivity facility in a networked secure collaborative exchange environment.
  57. Cam Winget,Nancy; Zhou,Hao; Jakkahalli,Padmanabha C.; Salowey,Joseph; McGrew,David A., Enabling stateless server-based pre-shared secrets.
  58. Cam-Winget, Nancy; Zhou, Hao; Jakkahalli, Padmanabha C.; Salowey, Joseph; McGrew, David A., Enabling stateless server-based pre-shared secrets.
  59. Luk, Fong, Encrypted cryptography system.
  60. Kehoe,Jeffrey W.; Lehmann,Robert, Filtering web proxy for recording web-based transactions that supports secure HTTP steps.
  61. Freitas, Nathanial X.; Conneely, Shane; Meyer, Will; Oakes, Jonathan, Flexible wireless advertisement integration in wireless software applications.
  62. Skinner, Craig S.; Wong, William Shu-Woon; Kuhn, Brian Gerald, Generic activation and registration framework for wireless devices.
  63. Connor,Edward J.; Chithambaram,Nemmara; DeAguiar,John Ricardo, Geographical data markup on a personal digital assistant (PDA).
  64. Doerksen, Richard; Besbris, David, Handheld client framework system.
  65. Hazlehurst, Peter Alexander; Alvarez, Cindy, Host exchange in bill paying services.
  66. Creemer, David Z., Identifying client patterns using online location-based derivative analysis.
  67. Teshima, Atsushi; Haneda, Norihisa, Image communication system.
  68. Oe, Takayasu, Image forming apparatus and address information processing method.
  69. Fukazawa, Koshi, Image forming apparatus, image data processing apparatus, and storage medium.
  70. Fukazawa,Koshi, Image forming apparatus, image data processing apparatus, and storage medium.
  71. Dubrovsky, Opher; Ein-Gil, Boaz; Wang, Jiahe Helen, Immunizing HTML browsers and extensions from known vulnerabilities.
  72. Rogerson, Dale E.; Chandrashekar, Sridhar; McRoberts, J. Shane; Dong, Wenlong; Reddish, Andrew D.; Chavda, Praful, In-place content substitution via code-invoking link.
  73. Takayama, Hisashi; Kawaguchi, Kyoko; Nakanishi, Yoshiaki; Sasaki, Osamu; Ando, Atsushi, Information terminal.
  74. Takayama, Hisashi; Kawaguchi, Kyoko; Nakanishi, Yoshiaki; Sasaki, Osamu; Ando, Atsushi, Information terminal.
  75. Takayama, Hisashi; Kawaguchi, Kyoko; Nakanishi, Yoshiaki; Sasaki, Osamu; Ando, Atsushi, Information terminal.
  76. Takayama, Hisashi; Kawaguchi, Kyoko; Nakanishi, Yoshiaki; Sasaki, Osamu; Ando, Atsushi, Information terminal.
  77. Takayama,Hisashi; Kawaguchi,Kyoko; Nakanishi,Yoshiaki; Sasaki,Osamu; Ando,Atsushi, Information terminal.
  78. Isozaki, Hiroshi; Saito, Takeshi; Matsushita, Tatsuyuki; Kamibayashi, Tooru, Information-processing device.
  79. Isozaki, Hiroshi; Saito, Takeshi, Information-processing device, information-processing method, and information-processing program product.
  80. Bonefas, Rudy G.; Sobchak, Richard K.; Zombek, James M., Intelligent messaging network server interconnection.
  81. Kumar, Srihari; Desai, Satyen; Kelley, John; Hayward, Blake Earl; Scott, Jenny; Pandurangan, Senthil Kumar, Interactive activity interface for managing personal data and performing transactions over a data packet network.
  82. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  83. Kuhn, Brian Gerald; Skinner, Craig S., Key for a wireless-enabled device.
  84. Robinson, B. Alex; Longé, Michael R.; Palmer, Brian H.; Hullfish, Keith C.; Brams, Douglas, Keyboard system with automatic correction.
  85. Ford, Christopher Todd, Litigation support in cloud-hosted file sharing and collaboration.
  86. Patel, Virag S., Load-balancing in replication engine of directory server.
  87. Bender, Christopher Lyle; Cho, Jung Hyun; Foy, Jason Paul; Nagarajan, Sivakumar, Managing application execution and data access on a device.
  88. Bender, Christopher Lyle; Cho, Jung Hyun; Foy, Jason Paul; Nagarajan, Sivakumar, Managing application execution and data access on a device.
  89. Schieman, Adam Richard; Major, Daniel Jonas; Goodman, Kevin; Nagarajan, Sivakumar, Managing permission settings applied to applications.
  90. Ryerson, Christopher Maybee; Bender, Christopher Lyle; Winkler, Michael Thomas; Bukurak, David; Altman, Benjamin, Managing use of network resources.
  91. Morag, Assaf; Gannot, Gary; Baharav, Ofir, Message and program system supporting communication.
  92. Agashe, Parag A.; Quick, Jr., Roy Franklin; Wang, Jun; Hsu, Raymond T., Method and apparatus for broadcast services in a communication system.
  93. Leung, Nikolai K. N.; Sinnarajah, Ragulan, Method and apparatus for broadcast signaling in a wireless communication system.
  94. Hawkins, Jeffrey C.; Sipher, Joseph K.; Lincke, Scott D., Method and apparatus for communications over low bandwidth communications networks.
  95. Armandpour, Tim; Malik, Masroor, Method and apparatus for detecting changes in websites and reporting results to web developers for navigation template repair purposes.
  96. Martin, Jr.,Bruce K.; Wang,Robert T.; Luna,Michael E. S., Method and apparatus for distributing authorization to provision mobile devices on a wireless network.
  97. Giles, James R.; Sailer, Reiner, Method and apparatus for pervasive authentication domains.
  98. Giles,James R.; Sailer,Reiner, Method and apparatus for pervasive authentication domains.
  99. Shon, Tae-Shik; Choi, Hyo-Hyun; Koo, Bon-Hyun, Method and apparatus for preventing replay attack in wireless network environment.
  100. Wills, Fergus M., Method and apparatus for protecting identities of mobile devices on a wireless network.
  101. Semple, James; Rose, Gregory Gordon, Method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication system.
  102. Leung, Nikolai K. N., Method and apparatus for providing protocol options in a wireless communication system.
  103. Sen, Sanjoy; Manning, Serge; Wang, Chung-Ching, Method and apparatus for providing support for multiple QoS levels within a third generation packet data session.
  104. Shen, Shuo, Method and apparatus for recovering sessions.
  105. Neil Daswani ; Suman Kumar Inala ; Ramakrishna Satyavolu ; P Venkat Rangan ; Sreeranga P. Rajan, Method and apparatus for restructuring of personalized data for transmission from a data network to connected and portable network appliances.
  106. Pritikin, Max, Method and apparatus for securely exchanging cryptographic identities through a mutually trusted intermediary.
  107. Pritikin,Max, Method and apparatus for securely exchanging cryptographic identities through a mutually trusted intermediary.
  108. Hawkes, Philip; Rose, Gregory G.; Hsu, Raymond T.; Rezaiifar, Ramin, Method and apparatus for security in a data processing system.
  109. Hawkes,Philip; Leung,Nikolai K. N.; Rose,Gregory G., Method and apparatus for security in a data processing system.
  110. Leung, Nikolai Konrad; Hawkes, Philip Michael; Rose, Gregory Gordon, Method and apparatus for security in a data processing system.
  111. Hsu, Raymond T., Method and apparatus for transmission framing in a wireless communication system.
  112. Vandermeijden,Tom R.; Eberbach,Adam H. E., Method and apparatus for using Caller ID information in a browser of a mobile communication device.
  113. Dusse, Steve; King, Peter F.; Schwartz, Bruce V.; Martin, Jr., Bruce K., Method and system facilitating web based provisioning of two-way mobile communications devices.
  114. Kwon, Ji-Hun; Yim, Seung-Hyouk; Nam, Gwang-Ho, Method and system for authenticating software.
  115. Lee, Sean S.; Casavant, Scott D.; Wang, Phillip T., Method and system for communicating between a host device and a user device through an intermediate device using a composite graphics signal.
  116. Wang, Phillip T.; Lee, Sean S.; Casavant, Scott D., Method and system for communicating between a host device and user device through an intermediate device using syntax translation.
  117. Wuebker, Carl L., Method and system for communication between two devices by editing machine specific information at a proxy server.
  118. Pollutro, Dennis Vance; Almquist, Andrew A., Method and system for establishing the identity of an originator of computer transactions.
  119. Singh, Atul; Joshi, Maneesh; Patel, Ashwin; Garimella, Annaji Rao, Method and system for implementing a best efforts resequencer.
  120. McGinnis, Brian Evan; Kothari, Vaibhavi; Tanaka, William; Tsun, Stephen Ngok; Stuart, Les R., Method and system for network management.
  121. Kumar, Srinivas; Bettadapura, Vijayashree S., Method and system for policy simulation.
  122. Chen, Tao; Bender, Paul E.; Agashe, Parag A.; Rezaiifar, Ramin; Pankaj, Rajesh K.; Wei, Yongbin, Method and system for reduction of decoding complexity in a communication system.
  123. Chen, Tao; Bender, Paul E.; Agashe, Parag A.; Rezaiifar, Ramin; Pankaj, Rajesh K.; Wei, Yongbin, Method and system for reduction of decoding complexity in a communication system.
  124. Kaplan, Ari David, Method and system for wireless database management.
  125. Kaplan,Ari D., Method and system for wireless database management.
  126. Feng, Rongfeng; Yin, Ping; Wu, Qiuxin, Method for backing up and restoring an encryption key.
  127. Linden, Mikael; Kurki, Teemu, Method for utilizing local resources in a communication system.
  128. Geiger, Robert L.; Lin, Jyh-Han; Van Peursem, James E.; Palaniswamy, Avinash C.; Subramanian, Ambiga; Battenhouse, Anna, Method for validating an application for use in a mobile communication device.
  129. Korb,Joseph; Odom,Jesse; Rein,David, Method of and system for transferring data over a wireless communications network.
  130. Huber,Adriano; Loher,Urs, Method, system and gateway allowing secured end-to-end access to WAP services.
  131. Lection,David B.; Masselle,Eric L., Method, system and program product for controlling web content usage.
  132. Boyer, John M.; Trakhtenberg, Vladimir, Method, system, and program product for generating and validating digital signatures.
  133. Boyer, John M.; Trakhtenberg, Vladimir, Method, system, and program product for preventing unauthorized changes to an electronic document.
  134. Calvin, Phil, Methods and apparatus for secure online access on a client device.
  135. Bahl, Paramvir; Venkatachary, Srinivasan; Balachandran, Anand, Methods and systems for compressing data packets.
  136. Lillie, Terrance L.; Wiedmann, Christian; Zeljko, Robert; Sneiderman, Richard P.; Wiedmann, Ulrich; Chu, Gigi C.; Lynch, Sean R., Methods and systems for exchanging security information via peer-to-peer wireless networks.
  137. John H. Yoakum ; James E. Reaves ; Paul D. Alluisi, Methods and systems for implementing a real-time, distributed, hierarchical database using a proxiable protocol.
  138. Yoakum,John H.; Reaves,James E.; Alluisi,Paul D., Methods and systems for implementing a real-time, distributed, hierarchical database using a proxiable protocol.
  139. Corbett, Tim; Petrov, Julian; Rivera, Juan, Methods and systems for improving resource utilization by delaying rendering of three dimensional graphics.
  140. Adams, Mark S.; Muldoon, John M.; Conklin, William Joseph; Jenkins, Richard Edward; Moss, Randie Lee, Methods and systems for interchanging documents between a sender computer, a server and a receiver computer.
  141. Adams, Mark S.; Muldoon, John M.; Conklin, William Joseph; Jenkins, Richard Edward; Moss, Randie Lee, Methods and systems for interchanging documents between a sender computer, a server and a receiver computer.
  142. Adams,Mark S.; Muldoon,John M.; Conklin,William Joseph; Jenkins,Richard Edward; Moss,Randie Lee, Methods and systems for interchanging documents between a sender computer, a server and a receiver computer.
  143. Treder, Terry Noel; Fleck, Christopher; Marano, Adam; Roychoudhry, Anil; Mazzaferri, Richard James, Methods and systems for maintaining desktop environments providing integrated access to remote and local resources.
  144. Kanefsky, Steven T., Methods and systems for managing information on wireless data devices.
  145. Mazzaferri, Richard James, Methods and systems for providing, by a remote machine, access to a desk band associated with a resource executing on a local machine.
  146. Mazzaferri, Richard James, Methods and systems for providing, by a remote machine, access to a desk band associated with a resource executing on a local machine.
  147. Mazzaferri, Richard James, Methods and systems for providing, by a remote machine, access to a desk band associated with a resource executing on a local machine.
  148. Mazzaferri, Richard James, Methods and systems for providing, by a remote machine, access to functionality associated with a resource executing on a local machine.
  149. Mazzaferri, Richard James, Methods and systems for providing, by a remote machine, access to graphical data associated with a resource provided by a local machine.
  150. Rivera, Juan; Corbett, Tim; Petrov, Julian, Methods and systems for remoting three dimensional graphics.
  151. Rivera, Juan; Corbett, Timothy J.; Petrov, Julian, Methods and systems for remoting three dimensional graphics.
  152. Rivera, Juan; Corbett, Timothy J.; Petrov, Julian, Methods and systems for remoting three dimensional graphics.
  153. Kefford, Mark Gregory; Vanderstraeten, Alain Marie Eric; Houthooft, Mario Raymond Louis, Methods and systems for secure transmission of information using a mobile device.
  154. Apostolopoulos, John G.; Cakareski, Jakov; Wee, Susie J.; Tan, Wai-tian, Methods and systems that use information about data packets to determine an order for sending the data packets.
  155. Michael S. Borella, Methods for ordered delivery of electronic content.
  156. Arsenault, David, Modifying browser requests to track browsing activities.
  157. Wu, Jonathan; Rajan, Sreeranga P., Network-based bookmark management and web-summary system.
  158. Nessett,Danny M., Offloading cryptographic processing from an access point to an access point server using Otway-Rees key distribution.
  159. Varghese, Thomas Emmanual; Harris, Steven Lucas; Fisher, Jon Bryan; Durai, Don Bosco, Online data encryption and decryption.
  160. Varghese, Thomas Emmanual; Harris, Steven Lucas; Fisher, Jon Bryan; Durai, Don Bosco, Online data encryption and decryption.
  161. Varghese, Thomas Emmanual; Harris, Steven Lucas; Fisher, Jon Bryan; Durai, Don Bosco, Online data encryption and decryption.
  162. Varghese, Thomas Emmanual; Harris, Steven Lucas; Fisher, Jon Bryan; Durai, Don Bosco, Online data encryption and decryption.
  163. Yu, Qing; Luo, Jiebo, Petite size image processing engine.
  164. Ferguson, Derek M., Pre-authenticated communication within a secure computer network.
  165. Sprigg, Stephen A.; Minear, Brian; Oliver, Mitchell B.; Gardner, III, Richard Wayne, Prepay accounts for applications, services and content for communication devices.
  166. Bloch, Eric D.; Carlson, Max D.; Kimm, Christopher; Simister, James B.; Steele, Oliver W.; Temkin, David T.; Wolff, Adam G., Presentation server.
  167. Ferguson, Geordon Thomas; Bender, Christopher Lyle; Zubiri, Alberto Daniel; Schneider, Kenneth Cyril; Whitehouse, Oliver; Hobbs, Christopher William Lewis, Presenting metadata from multiple perimeters.
  168. Ferguson, Geordon Thomas; Bender, Christopher Lyle; Zubiri, Alberto; Schneider, Kenneth Cyril; Whitehouse, Oliver; Hobbs, Christopher William Lewis, Presenting metadata from multiple perimeters.
  169. Adams, Neil Patrick; Little, Herbert Anthony, Privilege management and revocation.
  170. Arsenault, David, Processing browser requests based on trap lists.
  171. Arsenault, David, Processing browser requests to provide multiple portions of content having a consistent appearance.
  172. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Processing data using information embedded in a data request.
  173. Arsenault, David, Processing selected browser requests.
  174. Arsenault, David, Processing selected browser requests.
  175. Wang, Jiahe Helen; Fan, Xiaofeng; Jackson, Collin Edward; Howell, Jonathan Ryan; Xu, Zhenbin, Protection and communication abstractions for web browsers.
  176. Kuhn, Brian Gerald, Providing user interface data on a mobile computing device.
  177. Kuhn, Brian Gerald; Skinner, Craig S., Registration of a mobile computing device for a data service on a wireless network.
  178. Kuhn, Brian Gerald; Skinner, Craig S., Registration of a mobile computing device for a service on a wireless network.
  179. Lillie, Terrance L.; Wiedmann, Christian; Zeljko, Robert; Sneiderman, Richard P.; Wiedmann, Ulrich; Chu, Gigi C.; Lynch, Sean R., Remotely configurable bridge system and method for use in secure wireless networks.
  180. Skinner, Craig S., Requesting a user account for services.
  181. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince; Nanduri, Priya, Rule generalization for web application entry point modeling.
  182. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince; Nanduri, Priya, Rule generalization for web application entry point modeling.
  183. Franco, Roberto A.; Ganjam, Anantha P; Bedworth, John G.; Brundrett, Peter T.; Tokumi, Roland K, Running internet applications with low rights.
  184. Ferguson, Derek M., Secure communications between internet and remote client.
  185. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Secure data exchange.
  186. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Secure data exchange based on request destination.
  187. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S.; Hendren, III, C. Hudson, Secure data exchange between data processing systems.
  188. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Secure data exchange between data processing systems.
  189. Harada,Larry T.; Dolecki,Mark A.; Purdum,Christopher S.; Hendren, III,C. Hudson, Secure data exchange between date processing systems.
  190. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Secure data exchange for processing requests.
  191. Chan, Kwei; Junestam, John Erik Andreas, Secure product enablement over channels with narrow bandwidth.
  192. Grilli, Francesco; Casaccia, Lorenzo; Semple, James; Agashe, Parag A., Secure registration for a multicast-broadcast-multimedia system (MBMS).
  193. Paul F. Alexander, Secure satellite communications system.
  194. Patil,Basavaraj B.; Narayanan,Raja P.; Akhtar,Haseeb; Qaddoura,Emad A., Security framework for an IP mobility system using variable-based security associations and broker redirection.
  195. Bain,Ralph Victor, Self-decrypting web site pages.
  196. Rana, Ahad, Server-based browser system.
  197. Rana, Ahad, Server-based browser system.
  198. Chithambaram,Nemmara; Dandridge,Robin Warner; DeAguiar,John Ricardo, Single gesture map navigation graphical user interface for a thin client.
  199. Maes,Stephane H., Structure skeletons for efficient voice navigation through generic hierarchical objects.
  200. Bedell, Jeffrey A.; Codini, Michael; Hutz, David; Meyer, Douglas F.; Orozco, Luis V.; Ramachandran, Ramkumar; Trundle, Steven S., System and method for analyzing statistics in a reporting system.
  201. Freishtat, Gregg; Rajan, Palaniswamy, System and method for automated electronic notification and transaction execution.
  202. Rudnick, William M.; Sherman, Stephen G., System and method for communicating over mesh networks using waveform-enhanced, link-state routing.
  203. Rudnick, William M.; Sherman, Stephen G., System and method for communicating over mesh networks waveform-enhanced, link-state routing.
  204. Rudnick, William M., System and method for communicating using a plurality of TDMA mesh networks having efficient bandwidth use.
  205. Freishtat, Gregg; Rajan, Palaniswamy, System and method for determining revenue from an intermediary derived from servicing data requests.
  206. Wang, Yi Min; Sun, Qixiang; Simon, Daniel R.; Russell, Wilfred; Qiu, Lili; Padmanabhan, Venkata N., System and method for evaluating and enhancing source anonymity for encrypted web traffic.
  207. Adams, Neil Patrick; Little, Herbert Anthony; Kirkup, Michael Grant, System and method for handling data transfers.
  208. Little, Herbert Anthony; Adams, Neil Patrick; Kirkup, Michael Grant, System and method for handling data transfers.
  209. Morimoto, Nobuyoshi, System and method for identifying individual users accessing a web site.
  210. Kumar, Srinivas; Weber, Dean A., System and method for inferring access policies from access event records.
  211. Fieweger, Andrew; Wadley, Matthew; Azzolino, Angela; Sassin, Michael, System and method for information delivery based on at least one self-declared user attribute.
  212. Meyer, Jerry Lee; Velamoor, Sudhakar; Hakhinian, Mushegh, System and method for managing collaboration in a networked secure exchange environment.
  213. Lawson, Robert James; Creekmore, Jr., Mark; Basu, Subroto Kumar, System and method for managing user profiles.
  214. Lawson,Robert James; Creekmore, Jr.,Mark; Basu,Subroto Kumar, System and method for managing user profiles.
  215. Shenfield, Michael, System and method for mixed mode delivery of dynamic content to a mobile device.
  216. Zhou, Todd Tao; Batista, Ricardo, System and method for monitoring secure data on a network.
  217. Varghese, Thomas Emmanual; Wong, Sirena; Durai, Don Bosco; Fisher, Jon Bryan; Kothanath, Arun, System and method for personalized security signature.
  218. Adams, Neil Patrick; Little, Herbert Anthony, System and method for privilege management and revocation.
  219. Colligan, Edward T.; Vadasz, David; Cousineau, Bernard P.; Daetz, David D.; Duarte, Matias G., System and method for providing advertisement data or other content.
  220. Colligan, Edward T.; Kansal, Sachin S.; Daetz, David D.; Creemer, David Z.; Vadasz, David; Cousineau, Bernard P.; Duarte, Matias G., System and method for providing advertisement data to a mobile computing device.
  221. Kansal, Sachin S.; Daetz, David D., System and method for providing advertisement data to a mobile computing device.
  222. Kansal, Sachin; Daetz, David, System and method for providing advertisement data to a mobile computing device.
  223. Minear, Brian; Gardner, III, Richard Wayne; Sprigg, Stephen A.; Nguyen, Phil Tien; Oliver, Mitchell B.; Lekven, Eric J., System and method for providing subscribed applications on wireless devices over a wireless network.
  224. Zombek, James M.; Edwards, Donald J., System and method for re-directing requests from browsers for communications over non-IP based networks.
  225. Kaib, Paul; Freishtat, Gregg, System and method for scheduling harvesting of personal information.
  226. Rudnick, William M., System and method for synchronizing TDMA mesh networks.
  227. Kumar, Srinivas; Bettadapura, Vijayashree S., System and method for using variable security tag location in network communications.
  228. Amdahl, Saxon, System and method for utilizing a data reducing module for dictionary compression of encoded data.
  229. Kirkup, Michael G.; Little, Herbert A.; Yach, David P., System and method of connection control for wireless mobile communication devices.
  230. Kirkup,Michael G.; Little,Herbert A.; Yach,David P., System and method of connection control for wireless mobile communication devices.
  231. Kirkup,Michael G.; Little,Herbert A.; Yach,David P., System and method of connection control for wireless mobile communication devices.
  232. Muthuswamy, Sivakumar; Ramamurthy, Anupama, System and method of merging static data in web pages.
  233. Singh, Sumeet Sohan, System and method of verifying a number of a mobile terminal.
  234. Singh, Sumeet Sohan, System and method of verifying a number of a mobile terminal.
  235. Kumar, Srinivas; Weber, Dean A.; Roth, Virginia L.; Shah, Shadab Munam, System and method using globally unique identities.
  236. Manohar, Pradheesh; Nalwaya, Prashant; Agrawal, Prashant Kumar, System and methods for automatically accessing a web site on behalf of a client.
  237. Royer,Barry Lynn; Heil,John Andrew, System and user interface for adaptively processing and communicating URL data between applications.
  238. Royer,Barry Lynn; Heil,John Andrew, System and user interface supporting URL processing and concurrent application operation.
  239. Royer, Barry Lynn; Heil, John Andrew, System and user interface supporting context sharing between concurrently operating applications.
  240. Hazlehurst, Peter; Aman, Matthew; Diego, Doug, System for performing web authentication of a user by proxy.
  241. Medvinsky,Alexander, System for seamlessly updating service keys with automatic recovery.
  242. Homer, Gregg S., System for tracking digital information over a communications network.
  243. Homer,Gregg, System for tracking files transmitted over the internet.
  244. Francis, Arthur R.; Topol, Brad B., System, apparatus and method for transformation of java server pages into PVC formats.
  245. Kurapati, Srikrishna; Herle, Sudhindra Pundaleeka, System, method and apparatus for securely exchanging security keys and monitoring links in a IP communications network.
  246. Naim, Ghassan; Kurapati, Srikrishna, System, method and apparatus for troubleshooting an IP network.
  247. Naim, Ghassan; Kurapati, Srikrishna, System, method and apparatus for troubleshooting an IP network.
  248. Kaplan, Ari David, System, method and apparatus for wireless monitoring and management of computer systems.
  249. Lillie, Terrance L.; Wiedmann, Christian; Zeljko, Robert; Sneiderman, Richard P.; Wiedmann, Ulrich; Chu, Gigi C.; Lynch, Sean R., System, method and computer program product for updating security criteria in wireless networks.
  250. Kloba, David D.; Gray, Michael R.; Moore, David M.; Whittaker, Thomas E.; Williams, David J.; Weinstein, Rafael Z.; Freeman, Joshua E.; Upson, Linus M.; Landray, Tashana K., System, method, and computer program product for server side processing in a mobile device environment.
  251. Kloba, David D.; Gray, Michael R.; Moore, David M.; Whittaker, Thomas E.; Williams, David J.; Weinstein, Rafael Z.; Freeman, Joshua E.; Upson, Linus M.; Landray, Tashana K., System, method, and computer program product for server side processing in a mobile device environment.
  252. Lofgren, Neil E.; Seder, Phillip Andrew; MacIntosh, Brian T., Systems and methods facilitating communication with remote computers.
  253. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen, Systems and methods for additional retransmissions of dropped packets.
  254. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen, Systems and methods for additional retransmissions of dropped packets.
  255. Plamondon, Robert, Systems and methods for identifying long matches of data in a compression history.
  256. Plamondon, Robert, Systems and methods for identifying long matches of data in a compression history.
  257. Plamondon, Robert D., Systems and methods for identifying long matches of data in a compression history.
  258. Aarnio, Ari; Dipanshu, Sharma, Systems and methods for presenting and/or converting messages.
  259. Aarnio,Ari; Dipanshu,Sharma, Systems and methods for presenting and/or converting messages.
  260. Montemayor, Karl; Rodriquez, Robert; Samuels, Allen; Dittia, Zubin, Systems and methods for preserving transport layer protocol options.
  261. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Osviannikov, Michael; Plamondon, Robert, Systems and methods for providing dynamic ad hoc proxy-cache hierarchies.
  262. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Ovsiannikov, Michael; Plamondon, Robert, Systems and methods for providing dynamic ad hoc proxy-cache hierarchies.
  263. Sanda, Frank S.; Fukuda, Naohisa; Winn, Marc; Okazaki, Mitsutera; Royer, Paul, Systems and methods for providing secure communications for transactions.
  264. Sanda, Frank S.; Fukuda, Naohisa; Winn, Marc; Okazaki, Mitsutera; Royer, Paul, Systems and methods for providing secure communications for transactions.
  265. Samuels, Allen R.; Collins, Henry, Systems and methods for real-time endpoint application flow control with network structure component.
  266. Samuels, Allen R.; Collins, Henry, Systems and methods for real-time endpoint application flow control with network structure component.
  267. Samuels, Allen R.; Jensen, Richard; Dittia, Zubin; Decasper, Dan S.; Ovsiannikov, Michael; Plamondon, Robert D., Systems and methods for sharing compression histories between multiple devices.
  268. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Ovsiannikov, Michael; Plamondon, Robert, Systems and methods for sharing compression histories between multiple devices.
  269. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen, Systems and methods for stochastic-based quality of service.
  270. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Ovsiannikov, Michael; Plamondon, Robert, Systems and methods of compression history expiration and synchronization.
  271. Ford, Christopher Todd; Acharya, Visal Chandrakant; Anstey, Richard David; Awan, Wasif Qayyum; Azmi, Amir M.; Azuma, Selom Harry; Callison, Wade Michael; Cazalot, Clement; Choudhary, Mayank; Cleary, Peter W.; Dsilva, Benedict Robert; Ertunc, Fuat; Genzer, Simon; Giudice, John William; Gordon, Douglas McLean; Gorin, Jonathan; Hakhinian, Mushegh; Held, John; Hovsepian, Ronald W.; Kannan, Ganesh; Landy, John; Lindsay, David Scott; Lirio, Dario R.; Mahajan, Himali; Mangez, Olivier; McCarthy, Kevin L.; McNulty, Kevin; Meyer, Jerry Lee; Miharia, Anupam; Miroslav, Constantin; Mitchell, Andrew James; Mittermaier, Uli P.; Morparia, Harshal; Negrea, Alex; Nikolayeva, Yana; Parimi, Madhavi; Porzio, Matthew A.; Purohit, Vedang Shailesh; Rozin, Liviu; Sappor, Godsway; Schwartz, Glenn; Siddiqui, Fahim; Swamy, Nanu; Tearnen, Paul; Toyloy-Mattera, Karla; Velamoor, Sudhakar; Vora, Margin; Waluk, Michael Joseph; Weiblen, Charlie; Wenzel, Peter; Wong, Jeffery Chi; Yip, Tony; Ghafoor, Khurram, Systems and methods of secure data exchange.
  272. Ford, Christopher Todd; Acharya, Visal Chandrakant; Anstey, Richard David; Awan, Wasif Qayyum; Azmi, Amir M.; Azuma, Selom Harry; Callison, Wade Michael; Cazalot, Clement; Choudhary, Mayank; Cleary, Peter W.; Dsilva, Benedict Robert; Ertunc, Fuat; Genzer, Simon; Giudice, John William; Gordon, Douglas McLean; Gorin, Jonathan; Hakhinian, Mushegh; Held, John; Hovsepian, Ronald W.; Kannan, Ganesh; Landy, John; Lindsay, David Scott; Lirio, Dario R.; Mahajan, Himali; Mangez, Olivier; McCarthy, Kevin L.; McNulty, Kevin; Meyer, Jerry Lee; Miharia, Anupam; Miroslav, Constantin; Mitchell, Andrew James; Mittermaier, Uli P.; Morparia, Harshal; Negrea, Alex; Nikolayeva, Yana; Parimi, Madhavi; Porzio, Matthew A.; Purohit, Vedang Shailesh; Rozin, Liviu; Sappor, Godsway; Schwartz, Glenn; Siddiqui, Fahim; Swamy, Nanu; Tearnen, Paul; Toyloy-Mattera, Karla; Velamoor, Sudhakar; Vora, Margin; Waluk, Michael Joseph; Weiblen, Charlie; Wenzel, Peter; Wong, Jeffery Chi; Yip, Tony; Ghafoor, Khurram, Systems and methods of secure data exchange.
  273. Ford, Christopher Todd; Choudhary, Mayank; McCarthy, Kevin L.; Miharia, Anupam; Giudice, John William; Tadakamalla, Kiran Kumar; Mercer, Cole Parker; Wenzel, Peter; Teamen, Paul; Cazalot, Clement; Darji, Salil J.; Gorin, Jonathan, Systems and methods of secure data exchange.
  274. Ovsiannikov, Mike; Decasper, Dan; Plamondon, Robert; Samuels, Allen, Systems and methods of using an IP ID field for automatic WAN/LAN detection.
  275. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Ovsiannikov, Michael; Plamondon, Robert, Systems and methods of using application and protocol specific parsing for compression.
  276. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen, Systems and methods of using packet boundaries for reduction in timeout prevention.
  277. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen R., Systems and methods of using packet boundaries for reduction in timeout prevention.
  278. Samuels, Allen; Sutter, Paul, TCP selection acknowledgements for communicating delivered and missing data packets.
  279. Palekar, Ashwin; Ayyagari, Arun; Simon, Daniel R., TLS tunneling.
  280. Varghese, Thomas Emmanual, Techniques for fraud monitoring and detection using application fingerprinting.
  281. Yegoshin, Leonid A, Telecommunication system for automatically locating by network connection and selectively delivering calls to mobile client devices.
  282. Yegoshin, Leonid A., Telecommunication system for automatically locating by network connection and selectively delivering calls to mobile client devices.
  283. Yegoshin, Leonid A., Telecommunication system for automatically locating by network connection and selectively delivering calls to mobile client devices.
  284. Yegoshin, Leonid A., Telecommunication system for automatically locating by network connection and selectively delivering calls to mobile client devices.
  285. Samuels, Allen R.; Sutter, Paul G., Transaction boundary detection for reduction in timeout penalties.
  286. Kadyk, Donald J.; Fishman, Neil S.; Seinfeld, Marc, Using an expert proxy server as an agent for wireless devices.
  287. Kadyk,Donald J.; Fishman,Neil S.; Seinfeld,Marc, Using an expert proxy server as an agent for wireless devices.
  288. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince, Using statistical analysis to generate exception rules that allow legitimate messages to pass through application proxies and gateways.
  289. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince, Using statistical analysis to generate exception rules that allow legitimate messages to pass through application proxies and gateways.
  290. Otte, Kurt W.; Van Melle, Ehren J. D., Validation of stored or incoming messages.
  291. Longe, Michael R.; Van Meurs, Pim, Virtual keyboard system with automatic correction.
  292. Kanevsky, Dimitri; Zadrozny, Wlodek Wlodzimierz, Virtual shadow briefcase in servers supporting moving embedded clients.
  293. Samuels, Allen R.; Sutter, Paul G., Wavefront detection and disambiguation of acknowledgements.
  294. Samuels, Allen R.; Sutter, Paul G., Wavefront detection and disambiguation of acknowledgements.
  295. Samuels, Allen R.; Sutter, Paul G., Wavefront detection and disambiguation of acknowledgments.
  296. Kaplan, Philippe; Moll, Georges-Henri; Nodet, Xavier; Oudot, Olivier, Web service request verification.
  297. Thermond, Jeffrey L.; Martin, Richard G., Wireless local area network channel resource management.
  298. Kuhn, Brian Gerald, Wireless services over different carrier networks.
  299. Oliver, Mitchell B.; Horel, Gerald Charles; Minear, Brian, Wireless subscriber application and content distribution and differentiated pricing.
  300. Yu, Julie; Oliver, Mitchell B.; Horel, Gerald Charles; Nguyen, Phil Tien; Prast, Sandra L.; Patwari, Jaiteerth, Wireless subscriber billing and distribution.
  301. Bartolome,Emiliano; Vondran, Jr.,Gary L., Wireless trusted point of access to a computer network.
  302. Kirkup, Michael G.; Brown, Michael K.; Little, Herbert A.; Robertson, Ian; Brown, Michael S., Wireless/wired mobile communication device with option to automatically block wireless communication when connected for wired communication.
  303. Kirkup, Michael G.; Brown, Michael K.; Little, Herbert A.; Robertson, Ian; Brown, Michael S., Wireless/wired mobile communication device with option to automatically block wireless communication when connected for wired communication.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로