$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method for encapsulating and transmitting a message includes private and forwarding network addresses with payload to an end of a tunneling association 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/16
  • G06F-015/173
출원번호 US-0385118 (1999-08-27)
발명자 / 주소
  • Beser, Nurettin B.
  • Borella, Michael
출원인 / 주소
  • 3COM Corporation
대리인 / 주소
    McDonnell Boehnen Hulbert & Berghoff
인용정보 피인용 횟수 : 99  인용 특허 : 14

초록

Methods for processing a media flow at an end of a tunneling association in a data network. One method includes receiving a data packet on a public network, such as the Internet, and recognizing that it encapsulates another data packet for a virtual connection to an application. The virtual connecti

대표청구항

Methods for processing a media flow at an end of a tunneling association in a data network. One method includes receiving a data packet on a public network, such as the Internet, and recognizing that it encapsulates another data packet for a virtual connection to an application. The virtual connecti

이 특허에 인용된 특허 (14)

  1. Alkhatib Hasan S., Domain name routing.
  2. Toth Stefan,SEX ; Hall Goran,SEX, Method and apparatus for addressing a wireless communication station with a dynamically-assigned address.
  3. Schmidt Jonathan ; Donzis Lewis ; Donzis Henry ; Murphy John ; Baron Peter, Method and apparatus for communicating between a network workstation and an internet.
  4. Fox Richard H. (Sunnyvale CA) Galloway Brett D. (Campbell CA 4), Method for translating internet protocol addresses to other distributed network addressing schemes.
  5. David R. Comstock SE, Mobile terminating L2TP using mobile IP data.
  6. Perkins Charles E. (Peekskill NY), Network address management for a wired network supporting wireless communication to a plurality of mobile users.
  7. Yakov Rekhter ; Eric C. Rosen, Peer-model support for virtual private networks with potentially overlapping addresses.
  8. Rodwin Andrew S. ; Wenocur Jonathan H. ; Feinstein Michael G., Remote access apparatus and method which allow dynamic internet protocol (IP) address management.
  9. Nordman Mikael,SEX, Secure access method, and associated apparatus, for accessing a private IP network.
  10. Mayes John C. ; Coile Brantley W., Security system for network address translation systems.
  11. Gelb Edward J. (Wayne NJ), Security system for preventing unauthorized communications between networks by translating communications received in ip.
  12. Vacon Gary V. (Melrose MA) Visser John A. (Wakefield MA), Service name to network address translation in communications network.
  13. Chase Christopher J. ; Holmgren Stephen L. ; Medamana John Babu ; Saksena Vikram R., Traffic management for frame relay switched data service.
  14. Boyle John ; Holden James M. ; Levin Stephen E. ; Maiwald Eric S. ; Nickel James O. ; Snow ; deceased David Wayne ; Wrench ; Jr. Edwin H., Using trusted associations to establish trust in a computer network.

이 특허를 인용한 특허 (99)

  1. McDaniel,David W., Address hopping of packet-based communications.
  2. Nishio,Masahiro, Apparatus connected to network, and address determination program and method.
  3. Bertz, Lyle T.; Belser, John E., Assigning a type of address based on expected port utilization.
  4. Oroskar, Siddharth S., Assignment of wireless network resources.
  5. Donaghey, Robert J, Automatic attachment and detachment for hub and peripheral devices.
  6. Donaghey, Robert J, Automatic attachment and detachment for hub and peripheral devices.
  7. Chen, Weijing; Allen, Keith Joseph, Broadband access for virtual private networks.
  8. Chen, Weijing; Allen, Keith Joseph, Broadband access for virtual private networks.
  9. Chen, Weijing; Allen, Keith Joseph, Broadband access for virtual private networks.
  10. Chen, Weijing; Allen, Keith Joseph, Broadband access for virtual private networks.
  11. Chen,Weijing; Allen,Keith Joseph, Broadband access for virtual private networks.
  12. Goodman, Lee N; Flynn, James, Bypassing an application layer gateway.
  13. Meenan,Patrick; Damick,Jeffrey Joseph, Classifying devices using a local proxy server.
  14. Durand, Alain; Ward, David, Cloud-based network protocol translation data center.
  15. Alkhatib, Hasan S.; Tabagi, Fouad A.; Elwailly, Farid F.; Wootton, Bruce C., Communicating with an entity inside a private network using an existing connection to initiate communication.
  16. Kubota, Makoto; Oguchi, Naoki; Tsuruoka, Tetsumei, Communication data relay system and method of controlling connectability between domains.
  17. Vautrin, Olivier; Penno, Reinaldo; Kamisetty, Sarat, Converting between tunneling protocols.
  18. Alkhatib, Hasan S; Tobagi, Fouad A, Creating a public identity for an entity on a network.
  19. Keeler, James D.; Melendez, John R., Device-specific authorization at distributed locations.
  20. Keeler, James D.; Melendez, John R., Device-specific authorization at distributed locations.
  21. Yang,Ping Fai, Efficient implementation of wildcard matching on variable-sized fields in content-based routing.
  22. Chen,Weijing; Allen,Keith Joseph, Enhancement of resource reservation protocol enabling short-cut internet protocol connections over a switched network.
  23. Xie, Michael, Firewall interface configuration to enable bi-directional VoIP traversal communications.
  24. Xie, Michael, Firewall interface configuration to enable bi-directional VoIP traversal communications.
  25. Rossi, Steven K.; Almaula, Jay R.; Eren, Pekin E.; Stewart, Daniel F.; Wodka, Joseph F., Home network bridge-based communications method and apparatus.
  26. Chiles,David Clyde; Bosco,Eric, Home-networking.
  27. Chiles,David Clyde; Bosco,Eric, Home-networking.
  28. Chow, Peter El Kwan; Campbell, Douglas R.; Lias, Joseph L.; Rogers, Steve, Hybrid fiber/conductor integrated communication networks.
  29. Wan, Albert Chungbor, Internal substitution bi-level addressing for compatible public networks.
  30. Wan,Albert Chungbor, Internal substitution bi-level addressing for compatible public networks.
  31. Meenan,Patrick; Sengpiehl,Donald P.; Thornberg,Rich, Local proxy server for establishing device controls.
  32. Watson,Clinton, Mechanism for implementing Voice Over IP telephony behind network firewalls.
  33. Watson, Clinton, Mechanism for implementing voice over IP telephony behind network firewalls.
  34. Watson,Clinton, Mechanism for implementing voice over IP telephony behind network firewalls.
  35. Smith,Patrick D.; Uskali,Robert G., Method and apparatus for automated correlation of digital modulation impairment.
  36. Smith,Patrick D.; Uskali,Robert G., Method and apparatus for automated correlation of digital modulation impairment.
  37. Strathmeyer, Carl R.; Mercer, Hugh P.; Finnie, Donald K.; Illikkal, Rameshkumar G.; Phomsopha, Bounthavivone K., Method and apparatus for connecting packet telephony calls between secure and non-secure networks.
  38. Strathmeyer, Carl R.; Mercer, Hugh P.; Finnie, Donald K.; Illikkal, Rameshkumar G.; Phomsopha, Bounthavivone K., Method and apparatus for connecting packet telephony calls between secure and non-secure networks.
  39. Huang, Yennun; Lin, Chih Mei; Yajnik, Shalini; Wang, Chung Yih, Method and apparatus for content-based routing and filtering at routers using channels.
  40. Mousseau, Guy G.; Yoakum, John H., Method and apparatus for distributed MTP Level 2 architecture.
  41. Hayward, Jerry Glade, Method and apparatus for secure data transmissions.
  42. Hayward, Jerry Glade, Method and apparatus for secure data transmissions.
  43. Lueckenhoff,Bruce Arthur, Method and apparatus for tunneling information.
  44. Berg, Mitchell T., Method and system for communicating a request packet in response to a state.
  45. Berg,Mitchell T., Method and system for communicating an information packet through multiple networks.
  46. Berg, Mitchell T., Method and system for communicating an information packet through multiple router devices.
  47. Berg, Mitchell T., Method and system for communicating an information packet through multiple router devices.
  48. Berg,Mitchell T., Method and system for establishing a data structure of a connection with a client.
  49. Berg,Mitchell T., Method and system for executing protocol stack instructions to form a packet for causing a computing device to perform an operation.
  50. Berg,Mitchell T., Method and system for identifying a computing device in response to a request packet.
  51. Berg,Mitchell T., Method and system for identifying a computing device in response to an information packet.
  52. Berg,Mitchell T., Method and system for initiating execution of software in response to a state.
  53. Smith,Jonathan M.; Stolfo,Salvatore J.; Sherwin,Jeffrey C.; Chung,Jeffrey D.; Prodromidis,Andreas L., Method and system for obscuring user access patterns using a buffer memory.
  54. Berg, Mitchell T., Method and system for selecting a computing device for maintaining a client session in response to a request packet.
  55. Berg, Mitchell T., Method and system for selecting a computing device for maintaining a client session in response to a request packet.
  56. Chen,Xiyuan; Zhao,Baijun; Xu,Zhiyu, Method and system for voice handling via dynamic home agents in a network employing all-IP architecture.
  57. Rosenblum,David S., Method for sending and receiving a Boolean function over a network.
  58. Rosenblum, David S., Method for storing Boolean functions to enable evaluation, modification, reuse, and delivery over a network.
  59. Miller, Daryl R.; Wagstaff, David L.; Kuwata, Kaori, Method to tunnel UDP-based device discovery.
  60. Huber,Adriano; Loher,Urs, Method, system and gateway allowing secured end-to-end access to WAP services.
  61. Vargantwar, Sachin R.; Goyal, Anoop K.; Oroskar, Siddharth S.; Shetty, Manoj, Mitigating the impact of handoffs through comparison of historical call lengths.
  62. Vargantwar, Sachin R.; Goyal, Anoop K.; Oroskar, Siddharth S.; Shetty, Manoj, Mitigating the impact of handoffs through comparison of non-preferred wireless coverage areas.
  63. Narayanan, Raja P.; Khalil, Mohamed; Qaddoura, Emad A.; Akhtar, Haseeb, Mobile IP extensions rationalization (MIER).
  64. Saxena, Tarun; Penno, Reinaldo; Raghunath, Satish; Bakshi, Mayuresh; Vinapamula Venkata, Suresh Kumar; Gunuganti, Ramakanth, Modular lightweight tunneling mechanisms for transitioning between network layer protocols.
  65. Reamer, Douglas Alan, Multiconfigurable device masking shunt and method of use.
  66. Abuan, Joe; Graessley, Joshua; Jeong, Hyeonkuk; Tung, Berkat, NAT traversal for media conferencing.
  67. Abuan, Joe; Tung, Berkat; Jeong, Hyeonkuk; Graessley, Joshua, NAT traversal for media conferencing.
  68. Abuan, Joe; Tung, Berkat; Jeong, Hyeonkuk; Graessley, Joshua, NAT traversal for media conferencing.
  69. Shibata,Atsushi, Network management system.
  70. Smith, Patrick D.; Uskali, Robert G., Network quality of service localizer.
  71. Kong,Won keun, Network-connecting apparatus and method for providing direct connections between network devices in different private networks.
  72. Donaghey, Robert J, Personal area network apparatus.
  73. Donaghey, Robert J, Personal area network apparatus.
  74. Donaghey, Robert J, Personal area network with automatic attachment and detachment.
  75. Iyer,Prakash N.; Warrier,Ulhas S., Proxy-less packet routing between private and public address realms.
  76. Eisendrath,Benjamin; Spannbauer,Bradley; Smith, Jr.,Stanley O., Regulating concurrent logins associated with a single account.
  77. Chen, Weijing; Van Vleck, Paul F.; Allen, Keith Joseph, Resource reservation protocol based guaranteed quality of service internet protocol connections over a switched network through proxy signaling.
  78. Chen,Weijing; Van Vleck,Paul F.; Allen,Keith Joseph, Resource reservation protocol based guaranteed quality of service internet protocol connections over a switched network through proxy signaling.
  79. Patel, Parveen; Alkhatib, Hasan Shamsuddin, Routing using global address pairs.
  80. Patel, Parveen; Alkhatib, Hasan Shamsuddin, Routing using global address pairs.
  81. Palmer, John; Vazquez, George O., SNMP firewall for network identification.
  82. Garrett,John W.; Kalmanek, Jr.,Charles Robert; Murphy,Lawrence E.; Nguyen,Han Q.; Ramakrishnan,Kadangode K., Service selection in a shared access network using policy routing.
  83. Nguyen, Han Q.; Cataltepe, Tayfun; Saad, Samir S., Service selection in a shared access network using virtual networks.
  84. Bertz, Lyle T.; Belser, John E., Supporting simple IP with address translation in a proxy mobile IP gateway.
  85. Bertz, Lyle T.; Belser, John E., Supporting simple IP with address translation in a wireless communication device.
  86. Tighe,James R.; Higgins,Ronald D.; Platt,Richard B.; Bell,Robert T., System and method for a virtual telephony intermediary.
  87. Yang, Zhengrong, System and method for implementing multimedia calls across a private network boundary.
  88. Maggenti, Mark, System and method for registering IP address of wireless communication device.
  89. Fangman,Richard E.; Preston,Jason D., System and method for routing IP packets.
  90. Miller, Daryl R.; Wagstaff, David L.; Kuwata, Kaori, Systems and methods for creation of reverse virtual internet protocol addresses.
  91. Alex, Ramachandran Nirmala, Systems and methods for private network addressing in IP protocols.
  92. Breslin, Terence M.; Kucharczyk, David; Hinshaw, Jan Allen, Systems, methods, and apparatus for detecting a pattern within a data packet.
  93. Breslin, Terence M.; Kucharczyk, David; Hinshaw, Jan Allen, Systems, methods, and apparatus for detecting a pattern within a data packet and detecting data packets related to a data packet including a detected pattern.
  94. Cavgalar, Alexandros; Richmond, Robert D.; Stuchlik, Kenneth R., Trunk architecture for coupling central offices associated with public switched telephone networks.
  95. Nanji, Suhail; Palter, William, Tunnel interworking.
  96. Smith,Darren C., Video game voice chat with amplitude-based virtual ranging.
  97. Synnestvedt, Robert Glenn, Voice and dial service level agreement enforcement on universal gateway.
  98. Smith, Darren C., Voice-to-text chat conversion for remote video game play.
  99. Larsson, Pär; Nilsson, Mikael, WAP session tunneling.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로