$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for protecting operations of trusted internal networks 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/14
출원번호 US-0149911 (1998-09-09)
발명자 / 주소
  • Reshef Eran,ILX
  • Raanan Gil,ILX
  • Solan Eilon,ILX
출원인 / 주소
  • Sanctum Ltd., ILX
대리인 / 주소
    Brown Raysman Millstein Felder & Steiner LLP
인용정보 피인용 횟수 : 299  인용 특허 : 29

초록

The present invention is a security gateway system positioned between an external, untrusted computing environment and an internal, trusted computing environment that converts messages received from the external environment into simplified messages and converts the simplified messages into messages

대표청구항

[ What is claimed is:] [24.]24. A method for enabling formal verification of a system, the system comprising a first processing entity and a second processing entity connected by a communication bus, the first processing entity being connected to an untrusted computing environment and the second pro

이 특허에 인용된 특허 (29)

  1. Vu Hung T. (Ottawa CAX), Apparatus and method for providing a secure gateway for communication and data exchanges between networks.
  2. Abadi Martin (Palo Alto CA) Goldstein Andrew C. (Hudson MA) Lampson Butler W. (Cambridge MA), Compound principals in access control lists.
  3. Amstein Peter R. ; Blumer Thomas P. ; Coburn ; IV Arthur L. ; Forgaard Randy J. ; Schulert Andrew J. ; Stefanik Ted ; Mauceri Robert J., Computer system and computer-implemented process for creation and maintenance of online services.
  4. Hu Wei-Ming (Arlington MA), Method and apparatus for authenticating a client to a server in computer systems which support different security mechan.
  5. Abraham Dalen M. ; Barnes Todd A. ; Bouche Paul F. ; Bougetz Thomas P. ; Gosselin Tracy A. ; Grieve Mark G. ; Langdon Brent A. ; Allison Robert C. ; Nikkel Michael S., Method and apparatus for managing internetwork and intranetwork activity.
  6. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
  7. Glasser Daniel S. ; Reardon Thomas R. ; Ogus Aaron W. ; McKelvie Samuel J. ; Joy George, Method and system for adding a secure network server to an existing computer network.
  8. Cain Michael Eugene, Method and system for providing secured access to a server connected to a private computer network.
  9. Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA) Lampson Butler W. (Cambridge MA), Method for delegating authorization from one entity to another through the use of session encryption keys.
  10. Crozier Keith (Acton MA), Method for mapping, translating, and dynamically reconciling data between disparate computer platforms.
  11. Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA), Method for performing group exclusion in hierarchical group structures.
  12. Anderson Craig D. ; Anderson Mark B. ; Cookmeyer Eugene N. ; Daniels Ralph A. ; Wheat Lee E. ; Lingle Roger A., Protocol analyzer for monitoring digital transmission networks.
  13. Ross Jay B. (Pennington NJ), Protocol converter for a secure FAX transmission system.
  14. Autrey Kevin ; Gessel Robert J., Protocol interface gateway and method of connecting an emulator to a network.
  15. Osman Fazil (Escondido CA), Ring network security system with encoding of data entering a subnetwork and decoding of data leaving a subnetwork.
  16. Elgamal Taher (Palo Alto CA) Hickman Kipp E. B. (Los Altos CA), Secure socket layer application program apparatus and method.
  17. Gelb Edward J. (Wayne NJ), Security system for preventing unauthorized communications between networks by translating communications received in ip.
  18. Brown Ross M. ; Greenberg Richard G., System and method for controlling access to data entities in a computer network.
  19. Kimura Nobuko,JPX ; Onodera Takashi,JPX ; Yokoshi Noriyuki,JPX, System and method for converting communication protocols.
  20. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  21. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  22. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  23. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  24. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  25. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  26. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  27. Templin Fred L. ; Gupta Ajay ; Skinner Gregory D. ; Tynan Dermot Matthew,IEX, Transparent and secure network gateway.
  28. Okamoto Toshio,JPX ; Shimbo Atsushi,JPX ; Ishiyama Masahiro,JPX, User identification data management scheme for networking computer systems using wide area network.
  29. Rosenthal David S. H. (Palo Alto CA), X window security system.

이 특허를 인용한 특허 (299)

  1. Allavarpu, Sai V.; Angal, Rajeev, Abstract syntax notation to interface definition language converter framework for network management.
  2. Ben-Itzhak, Yuval, Application layer security method and system.
  3. Ben Itzhak,Yuval, Application-layer security method and system.
  4. Poling, Robert; Pugh, Richard S., Automatic discovery of users associated with screen names.
  5. Bromwich, Adam, Automatic training of a database intrusion detection system.
  6. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Automatically reconnecting a client across reliable and persistent communication sessions.
  7. Gilbert, Jr., Duane L.; Williams, Marcus R.; Okerholm, Andrea M.; Kristant, Elaine H.; Longo, Sheila A.; Kee, Daniel E.; Strauss, Marc D., Autonomous coverage robot.
  8. Ozick, Daniel N.; Okerholm, Andrea M.; Mammen, Jeffrey W.; Halloran, Michael J.; Sandin, Paul E.; Won, Chikyung, Autonomous coverage robot navigation system.
  9. Ozick, Daniel N.; Okerholm, Andrea M.; Mammen, Jeffrey W.; Halloran, Michael J.; Sandin, Paul E.; Won, Chikyung, Autonomous coverage robot navigation system.
  10. Gilbert, Jr., Duane L.; Williams, Marcus R.; Okerholm, Andrea M.; Kristant, Elaine H.; Longo, Sheila A.; Kee, Daniel E.; Strauss, Marc D., Autonomous coverage robot sensing.
  11. Hussey, Patrick Alan; Roy, Robert Paul; Neumann, Rogelio Manfred; Svendsen, Selma; Ozick, Daniel N.; Casey, Christopher M.; Kapoor, Deepak Ramesh; Campbell, Tony L.; Won, Chikyung; Morse, Christopher John; Burnett, Scott Thomas, Autonomous coverage robots.
  12. Jones, Joseph L.; Mack, Newton E.; Nugent, David M.; Sandin, Paul E., Autonomous floor cleaning robot.
  13. Jones, Joseph L.; Mack, Newton E.; Nugent, David M.; Sandin, Paul E., Autonomous floor-cleaning robot.
  14. Jones, Joseph L.; Mack, Newton E.; Nugent, David M.; Sandin, Paul E., Autonomous floor-cleaning robot.
  15. Jones, Joseph L.; Mack, Newton E.; Nugent, David M.; Sandin, Paul E., Autonomous floor-cleaning robot.
  16. Jones, Joseph L; Mack, Newton E; Nugent, David M; Sandin, Paul E, Autonomous floor-cleaning robot.
  17. Chiappetta, Mark J.; Frankel, James Paul, Autonomous mobile robot system.
  18. Cohen, David A.; Ozick, Daniel N.; Vu, Clara; Lynch, James; Mass, Philip R., Autonomous robot auto-docking and energy management systems and methods.
  19. Cohen, David A.; Ozick, Daniel N.; Vu, Clara; Lynch, James; Mass, Philip R., Autonomous robot auto-docking and energy management systems and methods.
  20. Cohen, David A.; Ozick, Daniel; Vu, Clara; Lynch, James; Mass, Philip R., Autonomous robot auto-docking and energy management systems and methods.
  21. Cohen, David A.; Ozick, Daniel; Vu, Clara; Lynch, James; Mass, Philip R., Autonomous robot auto-docking and energy management systems and methods.
  22. Cohen, David A.; Ozick, Daniel; Vu, Clara; Lynch, James; Mass, Philip R., Autonomous robot auto-docking and energy management systems and methods.
  23. Morse, Christopher J.; Ziegler, Andrew; Gilbert, Duane; Jones, Andrew, Autonomous surface cleaning robot for dry cleaning.
  24. Morse, Christopher J.; Ziegler, Andrew; Gilbert, Duane; Jones, Andrew, Autonomous surface cleaning robot for dry cleaning.
  25. Morse, Christopher John; Ziegler, Andrew; Gilbert, Jr., Duane; Jones, Andrew, Autonomous surface cleaning robot for dry cleaning.
  26. Ziegler, Andrew; Morse, Christopher John; Gilbert, Jr., Duane L.; Jones, Andrew, Autonomous surface cleaning robot for dry cleaning.
  27. Ziegler, Andrew; Gilbert, Duane; Morse, Christopher J.; Pratt, Scott; Sandin, Paul; Dussault, Nancy; Jones, Andrew, Autonomous surface cleaning robot for wet and dry cleaning.
  28. Ziegler, Andrew; Gilbert, Duane; Morse, Christopher J.; Pratt, Scott; Sandin, Paul; Dussault, Nancy; Jones, Andrew, Autonomous surface cleaning robot for wet and dry cleaning.
  29. Ziegler, Andrew; Gilbert, Duane; Morse, Christopher John; Pratt, Scott; Sandin, Paul; Dussault, Nancy; Jones, Andrew, Autonomous surface cleaning robot for wet and dry cleaning.
  30. Ziegler, Andrew; Gilbert, Duane; Morse, Christopher John; Pratt, Scott; Sandin, Paul; Dussault, Nancy; Jones, Andrew, Autonomous surface cleaning robot for wet and dry cleaning.
  31. Ziegler, Andrew; Gilbert, Duane; Morse, Christopher John; Pratt, Scott; Sandin, Paul; Dussault, Nancy; Jones, Andrew, Autonomous surface cleaning robot for wet and dry cleaning.
  32. Ziegler, Andrew; Morse, Christopher John; Gilbert, Jr., Duane L.; Jones, Andrew; Pratt, Scott; Sandin, Paul E.; Dussault, Nancy, Autonomous surface cleaning robot for wet and dry cleaning.
  33. Konandreas, Stefanos; Ziegler, Andrew; Morse, Christopher John, Autonomous surface cleaning robot for wet cleaning.
  34. Konandreas, Stefanos; Ziegler, Andrew; Morse, Christopher John, Autonomous surface cleaning robot for wet cleaning.
  35. Konandreas, Stefanos; Ziegler, Andrew; Morse, Christopher John, Autonomous surface cleaning robot for wet cleaning.
  36. Allavarpu, Sai V.; Angal, Rajeev; Karunaratne, Gihan R.; McCall, Mark B., CORBA metadata gateway to telecommunications management network.
  37. Jain,Mudit; Higgins,Steven L.; Meyer,Scott A., Cardiac rhythm management systems and methods using acoustic contractility indicator.
  38. Chiappetta, Mark J.; Frankel, James P., Celestial navigation system for an autonomous robot.
  39. Chiappetta, Mark J.; Frankel, James Paul, Celestial navigation system for an autonomous robot.
  40. Chiappetta, Mark J.; Frankel, James Paul, Celestial navigation system for an autonomous robot.
  41. Chiappetta, Mark J., Celestial navigation system for an autonomous vehicle.
  42. Chiappetta, Mark Joseph, Celestial navigation system for an autonomous vehicle.
  43. Kapoor, Deepak Ramesh; Dubrovsky, Zivthan A., Cleaning robot roller processing.
  44. Serafat, Reza; Theimer, Wolfgang; Gortz, Udo; Rateitschek, Klaus; Buth, Peter; Dufhues, Frank; Druke, Thomas; Imam, Amir; Steinert, Christian, Communication terminal.
  45. Schnittman, Mark Steven; Dubrovsky, Zivthan A.; Mammen, Jeffrey W.; Solochek, Aaron, Compact autonomous coverage robot.
  46. Schnittman, Mark Steven; Dubrovsky, Zivthan A.; Mammen, Jeffrey W.; Solochek, Aaron, Compact autonomous coverage robot.
  47. Schnittman, Mark Steven; Dubrovsky, Zivthan A.; Mammen, Jeffrey W.; Solochek, Aaron, Compact autonomous coverage robot.
  48. Schnittman, Mark; Dubrovsky, Zivthan A.; Mammen, Jeffrey W.; Solochek, Aaron, Compact autonomous coverage robot.
  49. Nachenberg,Carey, Computer code intrusion detection system based on acceptable retrievals.
  50. Svendsen, Selma; Ozick, Daniel N.; Casey, Christopher M.; Kapoor, Deepak Ramesh; Campbell, Tony L.; Won, Chikyung; Morse, Christopher John; Burnett, Scott Thomas, Coverage robot mobility.
  51. Svendsen, Selma; Ozick, Daniel N.; Casey, Christopher M.; Kapoor, Deepak Ramesh; Campbell, Tony L.; Won, Chikyung; Morse, Christopher John; Burnett, Scott Thomas, Coverage robot mobility.
  52. Svendsen, Selma; Ozick, Daniel N.; Casey, Christopher M.; Kapoor, Deepak Ramesh; Campbell, Tony L.; Won, Chikyung; Morse, Christopher John; Burnett, Scott Thomas, Coverage robot mobility.
  53. Svendsen, Selma; Ozick, Daniel N.; Casey, Christopher M.; Kapoor, Deepak Ramesh; Campbell, Tony L.; Won, Chikyung; Morse, Christopher John; Burnett, Scott Thomas, Coverage robot mobility.
  54. Schnittman, Mark Steven; Ozick, Daniel N.; Landry, Gregg W., Coverage robots and associated cleaning bins.
  55. Schnittman, Mark; Ozick, Daniel N.; Landry, Gregg W., Coverage robots and associated cleaning bins.
  56. Landry, Gregg W.; Cohen, David A.; Ozick, Daniel, Debris sensor for cleaning apparatus.
  57. Landry, Gregg W.; Cohen, David A.; Ozick, Daniel N., Debris sensor for cleaning apparatus.
  58. Landry, Gregg W.; Cohen, David A.; Ozick, Daniel N., Debris sensor for cleaning apparatus.
  59. Landry, Gregg W.; Cohen, David A.; Ozick, Daniel N., Debris sensor for cleaning apparatus.
  60. Landry, Gregg W.; Cohen, David A.; Ozick, Daniel N., Debris sensor for cleaning apparatus.
  61. Landry, Gregg W.; Cohen, David A.; Ozick, Daniel N., Debris sensor for cleaning apparatus.
  62. Medin, Jr., Milo S., Delivering multimedia services.
  63. Medin, Jr., Milo S., Delivering multimedia services.
  64. Ozick, Daniel N.; Gilbert, Jr., Duane L., Detecting robot stasis.
  65. Ozick, Daniel N.; Gilbert, Jr., Duane L., Detecting robot stasis.
  66. Kurose, Takahiro, Engineering method and establishing system.
  67. Atkins, Barry D.; Melgar, David O.; Nadalin, Anthony; Wesley, Ajamu A., Federated identity brokering.
  68. Liu, Changming; Cheung, Lee Chik, Firewall security between network devices.
  69. Liu, Changming; Cheung, Lee Chik, Firewall security between network devices.
  70. Allavarpu, Sai V.; Angal, Rajeev, Generic and dynamic mapping of abstract syntax notation (ASN1) to and from interface definition language for network management.
  71. Allavarpu,Sai V.; Dong,Xeusi; Lee,Linda C., IDL event and request formatting for corba gateway.
  72. Miyagawa,Akiko; Inada,Toru; Ushirozawa,Shinobu, Illegal access data handling apparatus and method for handling illegal access data.
  73. Inoue, Hiroaki; Sakai, Junji; Abe, Tsuyoshi; Edahiro, Masato, Information communication device and program execution environment control method.
  74. Furukawa,Hisao; Miyaguchi,Shoji, Integrated IP network.
  75. Furukawa, Hisao; Miyaguchi, Shoji, Integrated information communication system using conversion table to convert an external packet into an internal packet by embedding a header.
  76. Gong,Fengmin; Sargor,Chandramouli; Wang,Feiyi, Intrusion tolerant server system.
  77. Gutmann, Steffen; Eade, Ethan; Fong, Philip; Munich, Mario, Localization by learning of wave-signal distributions.
  78. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and apparatus for assigning access control levels in providing access to networked content files.
  79. Simmons, Timothy, Method and apparatus for associating tickets in a ticket hierarchy.
  80. Simmons, Timothy Ernest, Method and apparatus for associating tickets in a ticket hierarchy.
  81. Schejter, Lior; Gilboa, Yuval, Method and apparatus for graphically constructing applications utilizing information from multiple sources.
  82. Moriarty,Kathleen M., Method and apparatus for intercepting performance metric packets for improved security and intrusion detection.
  83. Braddy, Ricky Gene; Simmons, Timothy Ernest; Stone, David Sean, Method and apparatus for providing authorized remote access to application sessions.
  84. Braddy, Ricky Gene; Simmons, Timothy Ernest; Stone, David Sean, Method and apparatus for providing authorized remote access to application sessions.
  85. Braddy, Ricky Gene; Simmons, Timothy Ernest; Calvin, Phillip N., Method and apparatus for providing policy-based document control.
  86. Braddy, Ricky Gene; Simmons, Timothy Ernest, Method and apparatus for reducing disclosure of proprietary data in a networked environment.
  87. Blewett,Charles Douglas; Denker,John Stewart; Hall,Robert J., Method and apparatus for securely connecting a plurality of trust-group networks, a protected resource network and an untrusted network.
  88. Roman, John S.; Wade, Brian K., Method and computer system for controlling access by applications to this and other computer systems.
  89. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K. R., Bharath; Kumar, Anil, Method and device for performing caching of dynamically generated objects in a data communication network.
  90. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K.R., Bharath; Kumar, Anil, Method and device for performing caching of dynamically generated objects in a data communication network.
  91. Khemani, Prakash; Sundarrajan, Prabakar; Kumar, Lakshmi; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravanakumar, Method and device for performing integrated caching in a data communication network.
  92. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  93. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  94. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  95. Brown, Ralph W.; Keller, Robert; Medin, Milo S., Method and system for authorizing and authenticating users.
  96. Rivera, Juan, Method and system for dynamically associating access rights with a resource.
  97. Rivera, Juan, Method and system for dynamically associating access rights with a resource.
  98. Raanan, Gil; Moran, Tal; Galant, Yaron; El-Hanani, Yuval; Reshef, Eran, Method and system for extracting application protocol characteristics.
  99. Andrews, Burton Warren; Gemayel, Nader Michel; Pai, Dee; Sela, Rebecca Jeanette-Paul; Svenson, Joshua D.; Weston, Arthur Eladio, Method and system for implementing behavior isolating prediction model.
  100. Jones, Joseph L.; Mass, Philip R., Method and system for multi-mode coverage for an autonomous robot.
  101. Jones, Joseph L.; Mass, Philip R., Method and system for multi-mode coverage for an autonomous robot.
  102. Jones, Joseph L.; Mass, Philip R., Method and system for multi-mode coverage for an autonomous robot.
  103. Davis, Brent E., Method and system for pervasive access to secure file transfer servers.
  104. Brown, Ralph W.; Keller, Robert; Medin, Milo S.; Temkin, David, Method and system for restricting access to user resources.
  105. Brown, Ralph William; Medin, Jr., Milo S.; Keller, Robert; Temkin, David, Method and system for restricting access to user resources.
  106. Brown, Ralph William; Medin, Jr., Milo S.; Keller, Robert; Temkin, David, Method and system for restricting access to user resources.
  107. Brown, Ralph William; Medin, Milo S.; Keller, Robert; Temkin, David, Method and system for restricting access to user resources.
  108. Rao, Goutham; McCarthy, Lewis; Simmons, Timothy Ernest, Method and system for verification of an endpoint security scan.
  109. Rao, Goutham; McCarthy, Lewis; Simmons, Timothy Ernest, Method and system for verification of an endpoint security scan.
  110. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for routing packets from a gateway to an endpoint.
  111. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for routing packets from a gateway to an endpoint.
  112. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for routing packets from an endpoint to a gateway.
  113. Rao, Goutham; Rodriguez, Robert; Brueggemann, Eric, Method and systems for routing packets from an endpoint to a gateway.
  114. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for securing remote access to private networks.
  115. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for securing remote access to private networks.
  116. Rao, Goutham P.; Brueggemann, Eric R.; Rodriguez, Robert A., Method for maintaining transaction integrity across multiple remote access servers.
  117. Ben Itzhak, Yuval, Method for the automatic setting and updating of a security policy.
  118. Bishop, Fred A.; Saunders, Peter D., Methods and apparatus for conducting electronic transactions.
  119. Bishop, Fred A.; Saunders, Peter D., Methods and apparatus for conducting electronic transactions.
  120. Bishop, Fred A.; Saunders, Peter D., Methods and apparatus for conducting electronic transactions.
  121. Bishop, Fred Alan; Glazer, Elliot Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  122. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  123. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  124. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  125. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  126. DiBernado, Enrico; Pirjanian, Paolo, Methods and apparatus for position estimation using reflected light sources.
  127. DiBernardo, Enrico; Pirjanian, Paolo, Methods and apparatus for position estimation using reflected light sources.
  128. Bornstein,David M.; Morris,Stephen Jeffrey; O'Toole, Jr.,James W., Methods and apparatus for providing a network service to a virtual machine.
  129. Pedersen, Bradley, Methods and apparatus for providing access to persistent application sessions.
  130. Pedersen, Bradley J., Methods and apparatus for providing access to persistent application sessions.
  131. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Methods and systems for securing access to private networks using encryption and authentication technology built in to peripheral devices.
  132. Magenheimer, Daniel J.; McKee, Bret A.; Gardner, Robert D.; Hyser, Chris D., Migrating a virtual machine from a first physical machine in response to receiving a command to lower a power mode of the first physical machine.
  133. Shiva, SM Prakash; Rolia, Jerome; Venkatesh, Raman Ramteke; Islam, Mustazirul, Migrating virtual machines.
  134. Hyser, Chris D.; McKee, Bret A., Migrating virtual machines between physical machines in a define group.
  135. Gardner, Robert D.; McKee, Bret A.; Watson, Brian J.; Hyser, Chris D., Migration of a virtual machine in response to regional environment effects.
  136. Won, Chikyung; Sandin, Paul E.; Burnett, Scott Thomas; Kapoor, Deepak Ramesh; Hickey, Stephen A.; Rizzari, Robert; Dubrovsky, Zivthan A.; Svendsen, Selma, Modular robot.
  137. Won, Chikyung; Svendsen, Selma; Sandin, Paul E.; Burnett, Scott Thomas; Kapoor, Deepak Ramesh; Hickey, Stephen A.; Rizzari, Robert; Dubrovsky, Zivthan A. C., Modular robot.
  138. Won, Chikyung; Svendsen, Selma; Sandin, Paul E.; Burnett, Scott Thomas; Kapoor, Deepak Ramesh; Hickey, Stephen A.; Rizzari, Robert; Dubrovsky, Zivthan A. C., Modular robot.
  139. Terzis, Andreas; Murgia, Marco A.; Baskaran, Ashwin, Multilayer access control security system.
  140. Baker, Stephen M., Multilayered intrusion detection system and method.
  141. Ozick, Daniel N.; Okerholm, Andrea M.; Mammen, Jeffrey W.; Halloran, Michael J., Navigating autonomous coverage robots.
  142. Ozick, Daniel N.; Okerholm, Andrea M.; Mammen, Jeffrey W.; Halloran, Michael J.; Sandin, Paul E.; Won, Chikyung, Navigating autonomous coverage robots.
  143. Chiappetta, Mark J.; Jones, Joseph L., Navigational control system for a robotic device.
  144. Chiappetta, Mark J.; Jones, Joseph L., Navigational control system for a robotic device.
  145. Chiappetta, Mark J.; Jones, Joseph L., Navigational control system for a robotic device.
  146. Landry, Gregg W.; Cohen, David A.; Ozick, Daniel N.; Chiappetta, Mark J.; Jones, Joseph L., Navigational control system for a robotic device.
  147. Landry, Gregg W.; Cohen, David A.; Ozick, Daniel N.; Chiappetta, Mark J.; Jones, Joseph L., Navigational control system for a robotic device.
  148. Landry, Gregg W.; Cohen, David A.; Ozick, Daniel N.; Chiappetta, Mark J.; Jones, Joseph L., Navigational control system for a robotic device.
  149. Landry, Gregg W; Cohen, David A.; Ozick, Daniel N.; Chiappetta, Mark J.; Jones, Joseph L., Navigational control system for a robotic device.
  150. Williamson, Mark, Network access.
  151. Kaffine,David M.; Schmidt,Peter H.; Rosen,Joseph S.; Wolf,Jonathan; Mellor,Arthur, Network fault isolation.
  152. Lyon,Barrett, Network overload detection and mitigation system and method.
  153. Casey, Christopher M.; Cross, Matthew; Ozick, Daniel N.; Jones, Joseph L., Obstacle following sensor scheme for a mobile robot.
  154. Casey, Christopher M.; Cross, Matthew; Ozick, Daniel N.; Jones, Joseph L., Obstacle following sensor scheme for a mobile robot.
  155. Casey, Christopher M.; Cross, Matthew; Ozick, Daniel N.; Jones, Joseph L., Obstacle following sensor scheme for a mobile robot.
  156. Casey, Christopher M.; Cross, Matthew; Ozick, Daniel N.; Jones, Joseph L., Obstacle following sensor scheme for a mobile robot.
  157. Casey, Christopher; Cross, Matthew; Ozick, Daniel; Jones, Joseph L., Obstacle following sensor scheme for a mobile robot.
  158. Casey, Christopher; Cross, Matthew; Ozick, Daniel; Jones, Joseph L., Obstacle following sensor scheme for a mobile robot.
  159. Casey, Christopher; Cross, Matthew; Ozick, Daniel; Jones, Joseph L., Obstacle following sensor scheme for a mobile robot.
  160. Graveline, Marc; Roy, Patrick; Viney, Ulf, Opaque cryptographic web application data protection.
  161. Shanklin, Steven D.; Lathem, Gerald S., Parallel intrusion detection sensors with load balancing for high speed networks.
  162. Shanklin, Steven D.; Lathem, Gerald S., Parallel intrusion detection sensors with load balancing for high speed networks.
  163. Allavarpu, Sai V.; Bhalerao, Anand J., Pluggable authentication modules for telecommunications management network.
  164. Srisuresh, Pyda; Murgia, Marco A.; Gunuganti, Ramakanth, Policy based network address translation.
  165. Srisuresh, Pyda; Murgia, Marco A.; Gunuganti, Ramakanth, Policy based network address translation.
  166. Thibadeau, Robert, Protocol scripting language for safe execution in embedded system.
  167. Betros,Kim; Chidiac,Ghassan; Gupta,Sanjay; Nordyke,Jeff; Palleschi,Giancarlo; Rosenthal,Matthew; Roubiecek,Evan E.; Vimba,Arnold O.; Zarnick,Michael P., Providing authorized access and request-initiated translation of data files.
  168. Nachenberg, Carey; Barajas, Frank, Real-time training for a computer code intrusion detection system.
  169. Dubrovsky, Zivthan A.; Landry, Gregg W.; Halloran, Michael J.; Lynch, James, Remote control scheduler and method for autonomous robotic device.
  170. Dubrovsky, Zivthan; Landry, Gregg; Halloran, Michael John; Lynch, James Kenneth, Remote control scheduler and method for autonomous robotic device.
  171. Won, Chikyung; Hickey, Stephen A.; Schnittman, Mark Steven; Dubrovsky, Zivthan A.; Svendsen, Selma; Lowry, Jed; Swett, David; Devlin, John, Removing debris from cleaning robots.
  172. Won, Chikyung; Hickey, Stephen A.; Schnittman, Mark Steven; Dubrovsky, Zivthan A.; Svendsen, Selma; Lowry, Jed; Swett, David; Devlin, John, Removing debris from cleaning robots.
  173. Won, Chikyung; Hickey, Stephen A.; Schnittman, Mark; Dubrovsky, Zivthan A.; Svendsen, Selma; Lowry, Jed; Swett, David; Devlin, John, Removing debris from cleaning robots.
  174. Jones, Joseph L.; Mass, Philip R., Robot confinement.
  175. Jones, Joseph L.; Mass, Philip R., Robot confinement.
  176. Jones, Joseph L.; Mass, Philip R., Robot confinement.
  177. Halloran, Michael J.; Mammen, Jeffrey W.; Campbell, Tony L.; Walker, Jason S.; Sandin, Paul E.; Billington, Jr., John N.; Ozick, Daniel N., Robot system.
  178. Halloran, Michael J.; Mammen, Jeffrey W.; Campbell, Tony L.; Walker, Jason S.; Sandin, Paul E.; Billington, Jr., John N.; Ozick, Daniel N., Robot system.
  179. Halloran, Michael J.; Mammen, Jeffrey W.; Campbell, Tony L.; Walker, Jason S.; Sandin, Paul E.; Billington, Jr., John N.; Ozick, Daniel N., Robot system.
  180. Halloran, Michael J.; Mammen, Jeffrey W.; Campbell, Tony L.; Walker, Jason S.; Sandin, Paul E.; Billington, Jr., John N.; Ozick, Daniel N., Robot system.
  181. Halloran, Michael J.; Mammen, Jeffrey W.; Campbell, Tony L.; Walker, Jason S.; Sandin, Paul E.; Billington, Jr., John N.; Ozick, Daniel N., Robot system.
  182. Gilbert, Jr., Duane Leigh; Bursal, Faruk Halil; Therrien, Richard Joseph; Morin, Russell Walter, Robotic vacuum.
  183. Gilbert, Jr., Duane Leigh; Bursal, Faruk Halil; Therrien, Richard Joseph; Morin, Russell Walter, Robotic vacuum.
  184. Gilbert, Jr., Duane L.; Bursal, Faruk Halil; Therrien, Richard Joseph; Morin, Russell Walter, Robotic vacuum cleaning system.
  185. Gilbert, Jr., Duane Leigh; Bursal, Faruk Halil; Therrien, Richard Joseph; Morin, Russell Walter, Robotic vacuum cleaning system.
  186. Gilbert, Jr., Duane Leigh; Bursal, Faruk Halil; Therrien, Richard Joseph; Morin, Russell Walter, Robotic vacuum cleaning system.
  187. Gilbert, Jr., Duane Leigh; Bursal, Faruk Halil; Therrien, Richard Joseph; Morin, Russell Walter, Robotic vacuum cleaning system.
  188. Boydstun,Kenneth C.; Marshall,Stephen L.; Chen,Jun, Screened subnet having a secured utility VLAN.
  189. Allavarpu,Sai V.; Dong,Xeusi; Lee,Linda C., Secure access to managed network objects using a configurable platform-independent gateway providing individual object-level access control.
  190. Barkan, Mordecai, Secure computer architectures, systems, and applications.
  191. Barkan, Mordecai, Secure computer architectures, systems, and applications.
  192. Dickelman, Mark J.; Ramsamooj, Prakash, Secure network system and associated method of use.
  193. Barkan, Mordecai, Secured automated or semi-automated systems.
  194. Barkan, Mordecai, Secured automated or semi-automated systems.
  195. Jolfaei, Masoud Aghadavoodi, Securing communications between different network zones.
  196. O'Brien, Richard; Lu, Raymond; Mitchem, Terrence; Minear, Spencer, Security framework for dynamically wrapping software applications executing in a computing system.
  197. O'Brien,Richard; Lu,Raymond; Mitchem,Terrence; Minear,Spencer, Security framework for supporting kernel-based hypervisors within a computing system.
  198. Freund, Gregor P., Security system with methodology for interprocess communication control.
  199. Hyser, Chris D.; McKee, Bret A.; Gardner, Robert D.; Magenheimer, Daniel J., Selecting one of plural layouts of virtual machines on physical machines.
  200. Johnson, Jeremy T.; Medin, Milo S., Sharing IP network resources.
  201. Hyser, Chris D.; McKee, Bret A., Starting up at least one virtual machine in a physical machine by a load balancer.
  202. Martin,Brian K., State machine for accessing a stealth firewall.
  203. Allavarpu, Sai V.; Bhalerao, Anand J., Synchronous task scheduler for corba gateway.
  204. Schmidt,Jeffrey C.; Gutierrez,Philip A.; Barker, Jr.,Charles R., System and method for a routing device to securely share network data with a host utilizing a hardware firewall.
  205. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste; Payne, John, System and method for automated policy audit and remediation management.
  206. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste; Payne, John, System and method for automated policy audit and remediation management.
  207. Remer, Eric B.; King, David A.; Remer, David L., System and method for connecting to a device on a protected network.
  208. Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
  209. Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
  210. Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
  211. Allavarpu,Sai V.; Bhat,Shivaram, System and method for event subscriptions for CORBA gateway.
  212. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpoie, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  213. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpole, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  214. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpole, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  215. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  216. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  217. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  218. Cole,David M.; Hanzlik,Dennis J.; Caso,Erik, System and method for network vulnerability detection and reporting.
  219. Keir,Robin M.; Ecker,Stephen A., System and method for network vulnerability detection and reporting.
  220. Kurtz, George R.; Cole, David M.; Caso, Erik; Kuykendall, Dan, System and method for network vulnerability detection and reporting.
  221. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  222. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  223. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  224. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  225. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K R, Bharath; Kumar, Anil, System and method for performing entity tag and cache control of a dynamically generated object not identified as cacheable in a network.
  226. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K R, Bharath; Kumar, Anil, System and method for performing entity tag and cache control of a dynamically generated object not identified as cacheable in a network.
  227. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan KR, Bharath; Kumar, Anil, System and method for performing flash caching of dynamically generated objects in a data communication network.
  228. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; K.R., Bharat Bhushan; Kumar, Anil, System and method for performing flash caching of dynamically generated objects in a data communication network.
  229. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bushan K. R., Bharath; Kumar, Anil, System and method for performing flash crowd caching of dynamically generated objects in a data communication network.
  230. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan KR, Bharath; Kumar, Anil, System and method for performing granular invalidation of cached dynamically generated objects in a data communication network.
  231. Everhart, Glenn C., System and method for preventing identity theft or misuse by restricting access.
  232. Rozman, Allen F.; Cioffi, Alfonso J., System and method for protecting a computer system from malicious software.
  233. Rozman, Allen F.; Cioffi, Alfonso J., System and method for protecting a computer system from malicious software.
  234. Rozman, Allen F.; Cioffi, Alfonso J., System and method for protecting a computer system from malicious software.
  235. Rozman, Allen F.; Cioffi, Alfonso J., System and method for protecting a computer system from malicious software.
  236. Rozman, Allen F.; Cioffi, Alfonso J., System and method for protecting a computer system from malicious software.
  237. Bowers, Theodore J; Ilijasic, Dean; Sanders, Shelley F., System and method for providing discriminated content to network users.
  238. Sanders, Shelley F.; Bowers, Theodore; Ilijasic, Dean, System and method for providing incentives to consumers to share information.
  239. Fei, Huchen; Yang, Dong; Hong, Xiao, System and method for rapid updating of credit information.
  240. Richardson, John W.; Chouinard, David A.; Chouinard, legal representative, Karen, System and method for regulating communications to or from an application.
  241. Richardson, John W.; Chouinard, David A.; Chouinard, legal representative, Karen, System and method for regulating the flow of information to or from an application.
  242. Carmeli, Haim Baruch, System and method for securing a computer communication network.
  243. Goring, Bryan Richard; DeBruin, David; Bibr, Viera; Fritsch, Brindusa; Shenfield, Michael, System and method for simplification of data structure in wireless communications.
  244. Miller, Lawrence R; Trenholm, Martin J., System and method for single session sign-on.
  245. Miller, Lawrence R; Trenholm, Martin J., System and method for single session sign-on.
  246. Andres, Steven G.; Cole, David M.; Cummings, Thomas Gregory; Garcia, Roberto Ramon; Kenyon, Brian Michael; Kurtz, George R.; McClure, Stuart Cartier; Moore, Christopher William; O'Dea, Michael J.; Saruwatari, Ken D., System and method of managing network security risks.
  247. Chaffee,Michael C.; Volcic,Edward; Stoddard,Kenneth A.; Kneifel, II,R. William, System controlling exclusive access by control programs to system resources.
  248. Rao,Goutham P.; Rodriguez,Robert; Brueggemann,Eric, System, apparatus and method for establishing a secured communications link to form a virtual private network at a network protocol layer other than at which packets are filtered.
  249. Miller, Randy; Poling, Robert; Pugh, Richard S.; Shapiro, Dmitry, Systems and methods for a protocol gateway.
  250. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for adjusting the maximum transmission unit by an intermediary device.
  251. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for adjusting the maximum transmission unit for encrypted communications.
  252. Miller, Randy; Poling, Robert; Pugh, Richard S.; Shapiro, Dmitry, Systems and methods for authentication of target protocol screen names.
  253. Adhya, Saibal; Choudhary, Akshat; Verzunov, Sergey; Mullick, Amarnath; Nanjundaswamy, Shashi; Kumar, Arkesh, Systems and methods for authorizing a client in an SSL VPN session failover environment.
  254. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for automatic installation and execution of a client-side acceleration program.
  255. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for client-side application-aware prioritization of network communications.
  256. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for communicating a lossy protocol via a lossless protocol.
  257. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for communicating a lossy protocol via a lossless protocol.
  258. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements.
  259. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements.
  260. Bezdicek, Jan; Bumbalek, Ladislav; Hall, Kenwood H.; Slajs, Jakub, Systems and methods for conducting communications among components of multidomain industrial automation system.
  261. Bezdicek, Jan; Bumbalek, Ladislav; Hall, Kenwood H.; Slajs, Jakub, Systems and methods for conducting communications among components of multidomain industrial automation system.
  262. Khemani, Prakash; Bandekar, Vishal, Systems and methods for configuring flow control of policy expressions.
  263. Khemani, Prakash; Bandekar, Vishal, Systems and methods for configuring handling of undefined policy events.
  264. Khemani, Prakash; Bandekar, Vishal, Systems and methods for configuring policy bank invocations.
  265. Khemani, Prakash; Bandekar, Vishal, Systems and methods for configuring policy bank invocations.
  266. Khemani, Prakash; Bandekar, Vishal, Systems and methods for configuring policy bank invocations.
  267. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for facilitating a peer to peer route via a gateway.
  268. Miller, Randy; Poling, Robert; Pugh, Richard S.; Shapiro, Dmitry, Systems and methods for implementing protocol enforcement rules.
  269. Poling, Robert; Nielsen, Mary; Scott, Robert, Systems and methods for implementing protocol enforcement rules.
  270. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Systems and methods for maintaining a client's network connection thru a change in network identifier.
  271. Howarth, Mark E.; Johnson, Peter E.; Butt, Alan B.; Eatough, David A., Systems and methods for managing a computer over a network.
  272. Kumar, Arkesh; Harris, James; Soni, Ajay, Systems and methods for managing a plurality of user sessions in a virtual private network environment.
  273. Kumar, Arkesh; Harris, James; Soni, Ajay, Systems and methods for managing a plurality of user sessions in a virtual private network environment.
  274. Sikka, Namit; Reddy, Anoop; Mirani, Rajiv; Chauhan, Abhishek, Systems and methods for managing application security profiles.
  275. Miller, Randy; Poling, Robert; Pugh, Richard S.; Shapiro, Dmitry, Systems and methods for managing messages in an enterprise network.
  276. Miller, Randy; Poling, Robert; Pugh, Richard S.; Shapiro, Dmitry, Systems and methods for managing messages in an enterprise network.
  277. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for network disruption shielding techniques.
  278. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for providing a VPN solution.
  279. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for providing a VPN solution.
  280. Day, Jeff; Valdes, Roberto, Systems and methods for providing authentication credentials across application environments.
  281. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for providing client-side accelerated access to remote applications via TCP buffering.
  282. Sundarrajan, Prabakar; He, Junxiao; Nanjundaswamy, Shashi; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for providing client-side accelerated access to remote applications via TCP multiplexing.
  283. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil; Nanjundaswamy, Shashi, Systems and methods for providing client-side accelerated access to remote applications via TCP pooling.
  284. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil; Suganthi, Josephine, Systems and methods for providing client-side dynamic redirection to bypass an intermediary.
  285. Khemani, Prakash; Bandekar, Vishal, Systems and methods for providing structured policy expressions to represent unstructured data in a network appliance.
  286. Miller,Randy; Poling,Robert; Pugh,Richard S.; Shapiro,Dmitry, Systems and methods for reflecting messages associated with a target protocol within a network.
  287. Shastri, Vijnan; Lee, Lisa; Tran, Trung, Systems and methods for remote rogue protocol enforcement.
  288. Furukawa, Hisao; Miyaguchi, Shoji, Terminal to-terminal communication connection control method using IP transfer network.
  289. Furukawa, Hisao; Miyaguchi, Shoji, Terminal-to-terminal communication connection control method using IP transfer network.
  290. Furukawa, Hisao; Miyaguchi, Shoji, Terminal-to-terminal communication connection control method using IP transfer network.
  291. Furukawa, Hisao; Miyaguchi, Shoji, Terminal-to-terminal communication connection control method using IP transfer network.
  292. Furukawa, Hisao; Miyaguchi, Shoji, Terminal-to-terminal communication connection control method using IP transfer network.
  293. Furukawa, Hisao; Miyaguchi, Shoji, Terminal-to-terminal communication connection control method using IP transfer network.
  294. Furukawa, Hisao; Miyaguchi, Shoji, Terminal-to-terminal communication connection control method using IP transfer network.
  295. Furukawa,Hisao; Miyaguchi,Shoji, Terminal-to-terminal communication connection control method using IP transfer network.
  296. Furukawa,Hisao; Miyaguchi,Shoji, Terminal-to-terminal communication connection control system for IP full service.
  297. Allavarpu,Sai V.; Angal,Rajeev; Bhalerao,Anand J., Thread-safe portable management interface.
  298. Blouin, Matthew, Vacuum brush.
  299. Moh'd Abdel-Hamid Hasan, Voice enabled system for remote access of information.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로