$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Network-based mobile workgroup system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/16
  • H04Q-007/20
출원번호 US-0729199 (2000-12-05)
발명자 / 주소
  • Forsl?w, Jan
출원인 / 주소
  • Interactive People Unplugged AB
대리인 / 주소
    Banner &
인용정보 피인용 횟수 : 261  인용 특허 : 9

초록

A network-based mobile workgroup system has considerably wider appeal and application than normal virtual private networks in that it provides seamless mobility across a number of access technologies at the same time as it offers a granular security separation down to workgroup level. The mobile wor

대표청구항

1. A network-based mobile workgroup system comprising:a plurality of mobile client nodes, each mobile client node providing an interface for user interaction by a mobile user; a plurality of mobile service router nodes, each mobile service router node providing a mobile Virtual Private Network (VPN)

이 특허에 인용된 특허 (9)

  1. Montenegro, Gabriel E., Chained registrations for mobile IP.
  2. Liu George,SEX, Distributing network services and resources in a mobile communications network.
  3. Aggarwal, Sudhir; Netravali, Arun N; Sabnani, Krishan K, Method for configuring a shared tree for routing traffic in a multicast conference.
  4. Shuen Pauline (Palo Alto CA), Mobile networking method and apparatus.
  5. Harrison, Bret Elliott; Reed, William Donald; Temoshenko, Leo, System and method for generation VPN network policies.
  6. Thomas W. Lynch, System and method for supporting multimedia communications upon a dynamically configured member network.
  7. Eric A. Voit ; Robert T. Baum, Traffic queueing for remote terminal DSLAMs.
  8. Peirce, Jr., Kenneth L.; Harper, Matthew; Mortsolf, Timothy G.; Xu, Yingchun; Dynarski, Richard J., Virtual home agent service using software-replicated home agents.
  9. Matthias Pfundstein DE, Virtual private network for mobile subscribers.

이 특허를 인용한 특허 (261)

  1. Fu, Guangrui; Funato, Daichi; Kawahara, Toshiro; Wood, Jonathan, Access network dynamic firewall.
  2. Haney, Richard D., Ad hoc location sharing group between first and second cellular wireless devices.
  3. Svendsen, Hugh; Sutherland, Harold, Aggregating media collections between participants of a sharing network utilizing bridging.
  4. Svendsen, Hugh; Sutherland, Harold, Aggregating media collections to provide a primary list and sorted sub-lists.
  5. Tosey, Joseph Peter Robert, Always-on virtual private network access.
  6. Haney, Richard D., Apparatus and method for obtaining content on a cellular wireless device based on proximity.
  7. Haney, Richard D., Apparatus and method for obtaining content on a cellular wireless device based on proximity to other wireless devices.
  8. Rue,Seon Soo, Apparatus and method for supporting mobility between subnetworks of mobile node in wireless LAN.
  9. Haney, Richard D., Apparatus and method to transmit content to a cellular wireless device based on proximity to other wireless devices.
  10. Thubert,Pascal; Wetterwald,Patrick; Ribiere,Vincent Jean; Levy Abegnoli,Eric M., Arrangement for providing optimized connections between peer routers in a tree-based ad hoc mobile network.
  11. Jia, Lujun R.; Patka, Andrew F., Assigning priority to network traffic at customer premises.
  12. Sriram, Tv; Kondapalli, Aswinikumar, Authenticated session replication.
  13. Teixeira De Magalhaes, Joao C.; Vijayan, Vivek; Chu, Oliver; Yu, Xiaodi; Almas de Jesus, Jr., Jose Ernesto; Aroonsirichoke, Sarunya; Chilukala, Veena; Fowler, Kayla, Automatic distribution of communication to user having common subject-matter interest and served by same or adjacent base station.
  14. Walker, Phillip M.; Thomas, Fred Charles; Lipinski, Greg J., Automatic firewall configuration.
  15. Volpano, Dennis M.; Zhao, Xinhua J., Bridged cryptographic VLAN.
  16. Volpano, Dennis Michael; Zhao, Xinhua J., Bridged cryptographic VLAN.
  17. Volpano, Dennis Michael; Zhao, Xinhua J., Bridged cryptographic VLAN.
  18. Svendsen, Hugh, Caching and synching process for a media sharing system.
  19. Dawson, Christopher J.; Finn, Peter G.; Hamilton, II, Rick A.; Li, Jenny S., Coalition formation and service provisioning of bandwidth sharing AD HOC networks.
  20. Svendsen, Hugh; Sutherland, Harold; Petersen, Steven L., Collection digest for a media sharing system.
  21. Harrison, David, Communication dongle physically coupled with a media device to automatically discover and launch an application on the media device and to enable switching of a primary output display from a first display of a mobile device to a second display of the media device through an operating system of the mobile device sharing a local area network with the communication dongle.
  22. Song, O-Sok; Choi, Sung-Ho; Bae, Eun-Hui; Choi, Chong-Ho; Kim, Young-Jip; Kim, Dong-Young, Communication method and apparatus using IP address of VPN gateway for mobile node in a VPN.
  23. Nabae, Takehiro, Communication network system.
  24. Ward-Karet, Jesse; Loer, Peter Benjamin; Loer, Christopher Jacob; Spiegel, Jeremy Scott; Bauer, Aaron Olaf Louick; Green, Brian Patrick; Firebaugh, John Edward; Ottum, Michael Latham; Min, Anna Esther, Content-based user interface, apparatus and method.
  25. Donahue, Joseph J.; Blegen, Darrell L., Contextual auto-replication in short range wireless networks.
  26. Donahue, Joseph J.; Blegen, Darrell L., Contextual auto-replication in short range wireless networks.
  27. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Wood, Jr., Lowell L., Coordinating instances of a thread or other service in emulation.
  28. Chandra,Madhavi Wunnava; Kulkarni,Milind M.; Leung,Kent K.; Patel,Alpesh, DHCP based home address management of mobile IP clients.
  29. Dawson, Christopher J.; Finn, Peter G.; Hamilton, II, Rick A.; Li, Jenny S., Demand pull and supply push communication methodologies.
  30. Goldschlag, David; Sapp, Kevin; Walker, David, Distributed data revocation using data commands.
  31. Chen, Ben Wei, Dual-mode wireless networked device interface and automatic configuration thereof.
  32. Lippincott, Lisa Ellen; Lincroft, Peter James; Goodrow, Dennis Sidney, Dynamic bandwidth throttling.
  33. Leung, Kent K., Dynamic network allocation for mobile router.
  34. Dawson, Christopher J.; Finn, Peter G.; Hamilton, II, Rick A.; Li, Jenny S., Efficiency and resiliency enhancements for transition states in ad hoc networks.
  35. Brousseau, William Reynolds; Walker, Kenneth Robert; Goldberg, Henry, Encrypted VPN connection.
  36. Shahbazi, Majid, Enterprise-wide security for computer devices.
  37. Shahbazi, Majid, Enterprise-wide security system for computer devices.
  38. Shahbazi, Majid, Enterprise-wide security system for computer devices.
  39. Shahbazi, Majid, Enterprise-wide security system for computer devices.
  40. Forslow, Jan, Extranet workgroup formation across multiple mobile virtual private networks.
  41. Forsl?w,Jan, Extranet workgroup formation across multiple mobile virtual private networks.
  42. Chowdhury, Kuntal; Senthilnathan, Janakiraman; Puthiyandyil, Sanil Kumar; Radhakrishnan, Shaji E.; Navali, Mruthyunjaya; Schwartz, Leonard, Fast handoff support for wireless networks.
  43. Le,Frank; Faccin,Stefano, Filtering of dynamic flows.
  44. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Firewall providing enhanced network security and user transparency.
  45. Wijnands, IJsbrand; Boers, Arjen; Cai, Yiqun; Speakman, Tony, Flooding control for multicast distribution tunnel.
  46. Dawson, Christopher J.; Finn, Peter G.; Hamilton, II, Rick A.; Li, Jenny S., Formation and rearrangement of ad hoc networks.
  47. Dawson, Christopher J.; Finn, Peter G.; Hamilton, II, Rick A.; Li, Jenny S., Formation and rearrangement of ad hoc networks.
  48. Dawson, Christopher J.; Finn, Peter G.; Hamilton, II, Rick A.; Li, Jenny S., Formation and rearrangement of ad hoc networks.
  49. Dawson, Christopher J.; Finn, Peter G.; Hamilton, II, Rick A.; Li, Jenny S., Formation and rearrangement of lender devices that perform multiplexing functions.
  50. Dawson, Christopher J.; Finn, Peter G.; Hamilton, II, Rick A.; Li, Jenny S., Formation and rearrangement of lender devices that perform multiplexing functions.
  51. Dawson, Christopher J.; Finn, Peter G.; Hamilton, II, Rick A.; Li, Jenny S., Formation and rearrangement of lender devices that perform multiplexing functions.
  52. Haney, Richard D., Formation of wireless device location sharing group.
  53. Chung, Jong-Hoon; Bang, Jun-Wan; Do, Geun-Chang; Lee, Sang-Kyun, Home code setting method for home network system.
  54. Ikeda, Shinkichi, Home link setting method, home gateway device, and mobile terminal.
  55. Yigang, Cai; Ke, Pei; Yang, Li Xiang, IMS diameter router with load balancing.
  56. Khanna, Bakul; Pon, Ron; Taraz, Ramin, IP security with seamless roaming and load balancing.
  57. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Wood, Jr., Lowell L., Implementing performance-dependent transfer or execution decisions from service emulation indications.
  58. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Wood, Jr., Lowell L., Implementing performance-dependent transfer or execution decisions from service emulation indications.
  59. Buddhikot, Milind M.; Chandranmenon, Girish P.; Han, Seung-Jae; Lee, Yui-Wah; Miller, Scott C.; Salgarelli, Luca, Integrated web cache.
  60. Buddhikot,Milind M.; Chandranmenon,Girish P.; Han,Seung Jae; Lee,Yui Wah; Miller,Scott C.; Salgarelli,Luca, Integrated web cache.
  61. Narayanan,Ram Gopal Lakshmi, Key distribution across networks.
  62. Iyer, Prakash N., Layering mobile and virtual private networks using dynamic IP address management.
  63. Yoakum, John H.; Villarica, R. Alberto, Local communication agent.
  64. Mononen,Risto; Grech,Sandro, Location privacy in a communication system.
  65. Haney, Richard D., Location sharing and tracking using mobile phones or other wireless devices.
  66. Haney, Richard D., Location sharing and tracking using mobile phones or other wireless devices.
  67. Haney, Richard D., Location sharing group for services provision.
  68. Haney, Richard D., Location sharing group map management.
  69. Haney, Richard D., Location sharing service between GPS-enabled wireless devices, with shared target location exchange.
  70. Jones, D. Mark; Ben-Hajla, Halim, Long-term evolution (LTE) policy control and charging rules function (PCRF) selection.
  71. Hirai, Masahito, Management apparatus, management method, and computer-readable medium.
  72. Gaya, Bruce; Marcy, Scott; Parker, Chris, Managing distributed computers.
  73. Haney, Richard D., Map presentation on cellular device showing positions of multiple other wireless device users.
  74. Lippincott, Lisa Ellen; Lincroft, Peter James; Loer, Peter Benjamin; Spiegel, Jeremy Scott; Goodrow, Dennis Sidney; Toto, Gregory Mitchell, Mechanisms for evaluating relevance of information to a managed device and performing management operations using a pseudo-agent.
  75. Li, Chunxiu; Wang, Yan; Chen, Guoyi, Method and apparatus for abstracting logical topology information of peer-to-peer network.
  76. Fink, Russell A.; Bubnis, Jr., Edward A.; Keller, Thomas E., Method and apparatus for anonymous IP datagram exchange using dynamic network address translation.
  77. Schnizlein, John M.; Droms, Ralph, Method and apparatus for assigning network addresses based on connection authentication.
  78. Schnizlein,John M.; Droms,Ralph, Method and apparatus for assigning network addresses based on connection authentication.
  79. Haddad, Wassim; Norrman, Karl; Larsson, Conny, Method and apparatus for combining internet protocol authentication and mobility signaling.
  80. Goodrow, Dennis Sidney; Williams, Amrit Tsering; Toto, Gregory Mitchell; Loer, Peter Benjamin, Method and apparatus for distributed policy-based management and computed relevance messaging with remote attributes.
  81. Mukherjee,Sarit; Paul,Sanjoy, Method and apparatus for enabling peer-to-peer virtual private network (P2P-VPN) services in VPN-enabled network.
  82. Vos, Gustav Gerald; Gielty, Steven Lawrence, Method and apparatus for facilitating push communication across a network boundary.
  83. Volpano, Dennis Michael, Method and apparatus for local area networks.
  84. Volpano, Dennis Michael, Method and apparatus for local area networks.
  85. Yip, Michael; Bagchi, Indranil; Bunker, Brian; Polo, Michael, Method and apparatus for network login authorization.
  86. Vos, Gustav Gerald; Kavanaugh, Richard Thomas; Mitchell, Andrew Hasley Watson; Waung, William Yih Yuan, Method and apparatus for network port and network address translation.
  87. Droms, Ralph; Schnizlein, John M., Method and apparatus for registering auto-configured network addresses based on connection authentication.
  88. Droms, Ralph; Schnizlein, John M., Method and apparatus for registering auto-configured network addresses based on connection authentication.
  89. Droms,Ralph; Schnizlein,John M., Method and apparatus for registering auto-configured network addresses based on connection authentication.
  90. Leung, Kent K.; Kulkarni, Milind M.; Patel, Alpesh, Method and apparatus for reusing DHCP addresses in home addresses of mobile IP clients.
  91. Shah,Tushar Ramesh; Kutac,Gregory Scott, Method and apparatus for voice over IP network address translation.
  92. Daskalopoulos, Vasilios Vasilios; Vos, Gustav Gerald, Method and system for aggregating communications.
  93. Svendsen, Hugh; Sutherland, Harold; Black, Gary W., Method and system for aggregating media collections between participants of a sharing network.
  94. Svendsen, Hugh; Sutherland, Harold; Black, Gary W., Method and system for aggregating media collections between participants of a sharing network.
  95. Svendsen, Hugh; Sutherland, Harold; Black, Gary W., Method and system for aggregating media collections between participants of a sharing network.
  96. Amidon, Christopher M.; Sutherland, Harold; Svendsen, Hugh, Method and system for aggregating music in the cloud.
  97. Rathi, Manish; Sharma, Rajesh, Method and system for auto discovery of authenticator for network login.
  98. Kavanaugh, Richard; Mitchell, Andrew Hasley Watson; Vos, Gustav Gerald, Method and system for forwarding data between network devices.
  99. Brown, David; Chaturvedi, Pawan; Taylor, Paul; Packingham, Kevin, Method and system for initiating a virtual private network over a shared network on behalf of a wireless terminal.
  100. Brown,David; Chaturvedi,Pawan; Taylor,Paul; Packingham,Kevin, Method and system for initiating a virtual private network over a shared network on behalf of a wireless terminal.
  101. Suh, Kyung-Joo; Choi, Sung-Ho, Method and system for managing mobility of an access terminal in a mobile communication system using mobile IP.
  102. Muley, Praveen, Method and system for providing configurable route table limits in a service provider for managing VPN resource usage.
  103. Carlson,Greg, Method and system for routing packets through a network by employing geographical position data.
  104. Pearlman, Marc Robert; Evans, Scott Charles; Hartman, Michael James; Rothe, Asavari, Method and system for routing traffic in a communication network.
  105. Balissat, Joel; Galand, Claude; Le Pennec, Jean Francois; Sommerlatt, Jean Marie, Method and system for securely scanning network traffic.
  106. Balissat, Joel; Galand, Claude; Le Pennec, Jean-Francois; Sommerlatt, Jean-Marie, Method and system for securely scanning network traffic.
  107. Balissat,Joel; Galand,Claude; Le Pennec,Jean Francois; Sommerlatt,Jean Marie, Method and system for securely scanning network traffic.
  108. Rayburn, Terry; McMullen, Michael P., Method and system for subnet-based transmission of mobile station location.
  109. Rue, Seon Soo; Lee, Gui Jung, Method and system for supporting mobility of mobile terminal.
  110. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for authenticating a user access request.
  111. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for authenticating a user access request.
  112. Gray, Gordon P.; Burke, Anthony Glenn; Luther, Jason E., Method for detecting rogue devices operating in wireless and wired computer network environments.
  113. Shin, Myung Ki; Kim, Yong Jin, Method for transmitting data by using X-cast mode.
  114. Harvey, Andrew G.; Ng, John, Method of controlling network access that induces consumption of merchant goods or services.
  115. Han,Sang Youn, Method of performing handoff in wireless asynchronous transfer mode network.
  116. Suh, Kyung-Joo; Yoon, Soon-Young; Kwon, Young-Hoon; Kim, Yong-Seok, Method of preventing replay attack in mobile IPv6.
  117. Lynggaard,Stefan, Method, apparatus and system for connecting a portable unit to a particular server unit from among a plurality of server units.
  118. Haverinen, Henry; Mikkonen, Jouni, Method, system and device for service selection via a wireless local area network.
  119. Leung,Kent K.; Kulkarni,Milind M.; Patel,Alpesh, Methods and apparatus for anchoring of mobile nodes using DNS.
  120. Sun, Joseph T.; Carroll, Cathleen N.; Chaudhary, Renu; Doon, Leland; Jung, Cynthia M.; Malek, John E., Methods and apparatus for use in a packet data network.
  121. Patel, Alpesh; Leung, Kent K., Methods and apparatus for using DHCP for home address management of nodes attached to an edge device and for performing mobility and address management as a proxy home agent.
  122. Baliga, Arati; Chen, Xu; Coskun, Baris; de los Reyes, Gustavo; Lee, Seungjoon; Mathur, Suhas; Van der Merwe, Jacobus; Xu, Gang, Methods and apparatus to configure virtual private mobile networks for security.
  123. Baliga, Arati; Chen, Xu; Coskun, Baris; de los Reyes, Gustavo; Lee, Seungjoon; Mathur, Suhas; Van der Merwe, Jacobus; Xu, Gang, Methods and apparatus to configure virtual private mobile networks for security.
  124. Van der Merwe, Jacobus; Chen, Xu; Coskun, Baris; de los Reyes, Gustavo; Lee, Seungjoon; Mathur, Suhas; Baliga, Arati; Xu, Gang, Methods and apparatus to configure virtual private mobile networks to reduce latency.
  125. Van der Merwe, Jacobus; Baliga, Arati; Chen, Xu; Coskun, Baris; de los Reyes, Gustavo; Lee, Seungjoon; Mathur, Suhas; Xu, Gang, Methods and apparatus to configure virtual private mobile networks with virtual private networks.
  126. Haney, Richard D., Methods and apparatuses for geospatial-based sharing of information by multiple devices.
  127. Haney, Richard D., Methods and apparatuses for transmission of an alert to multiple devices.
  128. Haney, Richard D., Methods and systems for annotating target locations.
  129. Tjong, Jung; Bettadapur, Prakash, Methods and systems for extracting information from computer code.
  130. Frick,John Kevin; Alexander, Jr.,Cedell A.; Stokes, Jr.,Olen Lee; Burton, III,Charles Frederick; Grosser, Jr.,Donald Bruce, Methods and systems for providing redundant connectivity across a network using a tunneling protocol.
  131. Haney, Richard D., Methods and systems for sharing position data and tracing paths between mobile-device users.
  132. Haney, Richard D., Methods and systems for sharing position data between subscribers involving multiple wireless providers.
  133. Haney, Richard D., Methods and systems for temporarily sharing position data between mobile-device users.
  134. Haney, Richard D., Methods and systems for temporarily sharing position data between mobile-device users.
  135. Tjong, Jung; Bettadapur, Prakash, Methods and systems for transforming a parse graph into an and/or command tree.
  136. Tjong, Jung; Bettadapur, Prakash, Methods and systems for transforming an AND/OR command tree into a command data model.
  137. Gray, Gordon P.; Luther, Jason E.; Augustine, Daniel T., Methods, apparatuses and systems facilitating management of airspace in wireless computer network environments.
  138. Gray, Gordon Paul; Luther, Jason Edward; Augustine, Daniel Thomas, Methods, apparatuses and systems facilitating management of airspace in wireless computer network environments.
  139. Haney, Richard D., Methods, systems and apparatuses for the formation and tracking of location sharing groups.
  140. Haney, Richard D., Methods, systems and apparatuses for the formation and tracking of location sharing groups.
  141. Craig, Jeffrey Alan; Kanode, Mark Edward; McCann, Thomas M.; Sprague, David Michael; Wallace, Donald E.; Marsico, Peter Joseph, Methods, systems, and computer readable media for answer-based routing of diameter request messages.
  142. Craig, Jeffrey Alan; Kanode, Mark Edward; McCann, Thomas Matthew; Sprague, David Michael; Wallace, Donald Eugene; Marsico, Peter Joseph, Methods, systems, and computer readable media for answer-based routing of diameter request messages.
  143. Craig, Jeffrey Alan; Kanode, Mark Edward; McCann, Thomas M.; Wallace, Donald E, Methods, systems, and computer readable media for diameter application loop prevention.
  144. Kanode, Mark Edward; Karmarkar, Kedar Kashinath; McCann, Thomas M.; Sprague, David Michael; Tomar, Mahesh; Wallace, Donald E.; Marsico, Peter Joseph, Methods, systems, and computer readable media for diameter network management.
  145. McCann, Thomas M.; Nas, Petrus Wilhelmus Adrianus Jacobus Maria; Marsico, Peter Joseph, Methods, systems, and computer readable media for diameter protocol harmonization.
  146. Marsico, Peter J., Methods, systems, and computer readable media for enriching a diameter signaling message.
  147. Craig, Jeffrey Alan; Kanode, Mark Edward; Karmarkar, Kedar Kashinath; Sprague, David Michael; Tomar, Mahesh; Wallace, Donald E., Methods, systems, and computer readable media for inter-diameter-message processor routing.
  148. Craig, Jeffrey Alan; Kanode, Mark Edward; Karmarkar, Kedar Kashinath; Sprague, David Michael; Tomar, Mahesh; Wallace, Donald Eugene, Methods, systems, and computer readable media for inter-diameter-message processor routing.
  149. Craig, Jeffrey Alan; Kanode, Mark Edward; Karmarkar, Kedar Kashinath; Sprague, David Michael; Wallace, Donald E., Methods, systems, and computer readable media for inter-message processor status sharing.
  150. McCann, Thomas M.; Tomar, Mahesh; Marsico, Peter Joseph, Methods, systems, and computer readable media for multi-interface monitoring and correlation of diameter signaling information.
  151. Kanode, Mark Edward; McCann, Thomas M.; Marsico, Peter Joseph, Methods, systems, and computer readable media for performing diameter answer message-based network management at a diameter signaling router (DSR).
  152. Kanode, Mark Edward; McCann, Thomas Matthew; Marsico, Peter Joseph, Methods, systems, and computer readable media for performing diameter answer message-based network management at a diameter signaling router (DSR).
  153. Sprague, David Michael; Khadri, Seetharaman; Khungar, Komal G.; Craig, Jeffrey Alan; Rao, Srikanth Nanjund, Methods, systems, and computer readable media for performing enhanced service routing.
  154. McCann, Thomas M.; Marsico, Peter J., Methods, systems, and computer readable media for providing diameter signaling router with integrated monitoring functionality.
  155. Craig, Jeffrey Alan; Kanode, Mark Edward; Karmarkar, Kedar Kashinath; McCann, Thomas Matthew; Sprague, David Michael; Tomar, Mahesh; Wallace, Donald E., Methods, systems, and computer readable media for providing local application routing at a diameter node.
  156. Craig, Jeffrey Alan; Kanode, Mark Edward; Karmarkar, Kedar Kashinath; McCann, Thomas M.; Tomar, Mahesh; Wallace, Donald E., Methods, systems, and computer readable media for providing origin routing at a diameter node.
  157. Craig, Jeffrey Alan; Kanode, Mark Edward; Karmarkar, Kedar Kashinath; Sprague, David Michael; Tomar, Mahesh; Wallace, Donald E., Methods, systems, and computer readable media for providing peer routing at a diameter node.
  158. Kanode, Mark Edward; Tomar, Mahesh; Marsico, Peter Joseph, Methods, systems, and computer readable media for providing priority routing at a diameter node.
  159. Mannaluru, Krishna; Palmer, Jonathan James; Kanode, Mark Edward; Khodri, Salim, Methods, systems, and computer readable media for routing a redirected request message.
  160. Craig, Jeffrey Alan; Kanode, Mark Edward; Sprague, David Michael; Wallace, Donald E.; Marsico, Peter Joseph, Methods, systems, and computer readable media for source peer capacity-based diameter load sharing.
  161. Shahbazi, Majid, Mobile data security system and methods.
  162. Buddhikot, Milind M.; Chandranmenon, Girish P.; Han, Seung-Jae; Lee, Yui-Wah; Miller, Scott C.; Salgarelli, Luca, Mobility access gateway.
  163. Periyalwar, Shalini; Zhang, Hang; Algie, Glenn; Zhu, Peiying; Matyas, Robert; Royer, Claude; Gage, Bill; Naden, James Mark; Javed, Alauddin, Multi-hop wireless backhaul network and method.
  164. Periyalwar, Shalini; Zhang, Hang; Algie, Glenn; Zhu, Peiying; Matyas, Robert; Royer, Claude; Gage, Bill; Naden, James; Javed, Alauddin, Multi-hop wireless backhaul network and method.
  165. Chandranmenon, Girish P.; Lee, Yui-Wah; Miller, Scott C.; Salgarelli, Luca; Virani, Salim, Multi-interface mobility client.
  166. Mohan,Seshadri; Luo,Haiping; Fu,Zhongsu, Multimedia personalized call management (MPCM).
  167. Balissat, Joel; Galand, Claude; Le Pennec, Jean Francois; Sommerlatt, Jean Marie, Multipoint server for providing secure, scaleable connections between a plurality of network devices.
  168. Nyman,Kai; Olkkonen,Mikko; Murto,Juhani; Oinonen,Kari, Naming distribution method for ad hoc networks.
  169. Parker,Benjamin J.; Werner,Shane W.; Diaz,Charles; Frederick,Terry M., Network security services architecture.
  170. Belmon, Stephane, Network systems and methods for providing guest access.
  171. Aggarwal, Rahul, Network-based macro mobility in cellular networks using an extended routing protocol.
  172. Chandrasiri, Pubudu; Gurleyen, Bulent Ozgur; Naslund, Mats; Jonsson, Annika; Gehrmann, Christian, Networks.
  173. Dawson, Christopher J.; Finn, Peter G.; Hamilton, II, Rick A.; Li, Jenny S., Optimization process and system for a heterogeneous ad hoc Network.
  174. Dawson, Christopher J.; Finn, Peter G.; Hamilton, II, Rick A.; Li, Jenny S., Optimization process and system for a heterogeneous ad hoc network.
  175. Dawson, Christopher J.; Finn, Peter G.; Hamilton, II, Rick A.; Li, Jenny S., Optimization process and system for multiplexed gateway architecture.
  176. Dawson, Christopher J.; Finn, Peter G.; Hamilton, II, Rick A.; Li, Jenny S., Optimization process and system for non-multiplexed peer-to-peer architecture.
  177. Alex,Arun C.; Warrier,Chandra, PDSN fast tunnel lookup.
  178. Dawson, Christopher J.; Finn, Peter G.; Hamilton, II, Rick A.; Li, Jenny S., Payment transfer strategies for bandwidth sharing in ad hoc networks.
  179. Kaler, Christopher G., Peer tunnels and peer group targets.
  180. Soebroto, Tobing; DeMaris, James; Medero, Jose L.; Tucker, Scott J., Power shutdown with isolation logic in I/O power domain.
  181. Chen, Ben Wei, Private and secure communication architecture without utilizing a public cloud based routing server.
  182. Chen, Ben Wei, Private and secure communication architecture without utilizing a public cloud based routing server.
  183. Chen, Ben Wei, Private cloud routing server, private network service and smart device client architecture without utilizing a public cloud based routing server.
  184. Chen, Ben Wei; Yen, Chin-Tang; Zhao, Shi-Ming, Private cloud server and client architecture without utilizing a routing server.
  185. Sethi,Aseem, Providing location-specific services to a mobile node.
  186. Svendsen, Hugh; Sutherland, Harold, Pruning an aggregate media collection.
  187. Volpano, Dennis Michael, Public access point.
  188. Volpano, Dennis Michael, Public access point.
  189. Cuervo, Fernando, Real-time policy evaluation mechanism.
  190. Traversat, Bernard A.; Abdelaziz, Mohamed M.; Duigou, Michael J.; Pouyoul, Eric; Hugly, Jean Christophe; Gong, Li; Yeager, William J.; Joy, William N.; Clary, Michael J., Relay peers for extending peer availability in a peer-to-peer networking environment.
  191. Trossen, Dirk; Chaskar, Hemant M., Relocation of content sources during IP-level handoffs.
  192. Petersen, Steven L.; Sutherland, Harold, Remote participation in a Local Area Network (LAN) based media aggregation network.
  193. Haney, Richard D., Rendez vous management using mobile phones or other mobile devices.
  194. Haney, Richard D., Rendez vous management using mobile phones or other mobile devices.
  195. Haney, Richard D., Rendez vous management using mobile phones or other mobile devices.
  196. Ould Brahim,Hamid; Fedyk,Donald, Resource allocation using an auto-discovery mechanism for provider-provisioned layer-2 and layer-3 virtual private networks.
  197. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Wood, Jr., Lowell L., Resource authorizations dependent on emulation environment isolation policies.
  198. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Wood, Jr., Lowell L., Resource authorizations dependent on emulation environment isolation policies.
  199. Aiello, William A.; Kalmanek, Jr., Charles Robert; Leighton, III, William J.; McDaniel, Patrick; Sen, Subhabrata; Spatscheck, Oliver; Van Der Merwe, Jacobus E., Reverse firewall with self-provisioning.
  200. Shin, Yong Sik; Ryu, Si Hoon; Lee, Dong Hahk, Roaming method between wireless local area network and cellular network.
  201. Halasz,David E.; Andrade,Merwyn B., Rogue AP detection.
  202. Cheon, Jung hoon, Router supporting network mobility over nested mobile network and a method for tunneling thereof.
  203. Saffre, Fabrice T P, Routing method and apparatus for communication in dynamic networks.
  204. Ostrowski, Gregg, Secure electronic device application connection to an application server.
  205. Yavatkar, Raj; Crouch, Alan; Durham, David M., Self-isolating and self-healing networked devices.
  206. Antoniou, Zoe; Dixit, Sudhir, Service-oriented protection scheme for a radio access network.
  207. Leung, Kent K.; Panda, Biswaranjan, Soft retention for call admission control in communication networks.
  208. Leung, Kent K.; Patel, Alpesh S., Support mobile device in asymmetric link environment.
  209. Iyer, Pradeep J.; Narasimhan, Partha, System and method for adaptive channel scanning within a wireless network.
  210. Iyer, Pradeep J.; Narasimhan, Partha, System and method for adaptive channel scanning within a wireless network.
  211. Yamaguchi,Keisuke; Komaki,Kenjiro; Masuda,Masaru; Shimada,Muneki; Kazuhiro,Kanee; Kimoto,Yousuke; Kannari,Shingo, System and method for controlling communication using device ID.
  212. Laudermilch, Norm; Supernor, William; Boroday, Roman; Goldschlag, David, System and method for controlling mobile device access to a network.
  213. Laudermilch, Norm; Supernor, William; Boroday, Roman; Goldschlag, David, System and method for controlling mobile device access to a network.
  214. Bahl,Pradeep; Bahl,Paramvir, System and method for coordinating bandwidth usage of a communication channel by wireless network nodes.
  215. Koodli, Rajeev; Perkins, Charles E., System and method for discovering network interface capabilities.
  216. Shahbazi, Majid, System and method for enforcing a security policy on mobile devices using dynamically generated security profiles.
  217. Dawson, Christopher J.; Finn, Peter G.; Hamilton, II, Rick A.; Li, Jenny S.; Mullins, Philip K., System and method for establishing peer-to-peer bandwidth sharing ad hoc networks.
  218. Dawson, Christopher J.; Finn, Peter G.; Hamilton, II, Rick A.; Li, Jenny S., System and method for fair-sharing in bandwidth sharing ad-hoc networks.
  219. Martin, Richard; Kim, Yong, System and method for hardware acceleration in a hybrid wired/wireless local area network.
  220. Martin, Richard; Kim, Yong, System and method for hardware acceleration in a hybrid wired/wireless local area network.
  221. Ellis,Alonzo, System and method for maintaining N number of simultaneous cryptographic sessions using a distributed computing environment.
  222. Iyer, Pradeep J.; Narasimhan, Partha, System and method for monitoring and enforcing policy within a wireless network.
  223. Iyer, Pradeep J.; Narasimhan, Partha, System and method for monitoring and enforcing policy within a wireless network.
  224. Griffith,Terry A.; Moran,Stephen M.; Bragg,John M., System and method for remotely monitoring wireless networks.
  225. Wilding, Mark F.; Horman, Randall W., System and method for secure remote access.
  226. Bajar, David; Little, Herb A.; Godfrey, James; Lewis, Allan David; Gao, Wen; Plumb, Marc; Brown, Michael Kenneth; Whittington, Graeme; Adams, Neil Patrick, System and method for securing a personalized indicium assigned to a mobile communications device.
  227. Kim, JooYong; Oh, YoungBae; Kim, DongHyun, System and method for selecting an optimal authoritative name server.
  228. Ratica, Adam; Yucha, Matthew; Weidner, Marcus L.; Heiss, Andrew T.; Baird, Christopher A.; Schick, IV, John M., System architecture for DMZ external IP addresses.
  229. Park, Chang-hwan, System for and method of authenticating device and user in home network.
  230. Kröselberg, Dirk, System for negotiating security association on application layer.
  231. Yang, Jen-Shun; Wu, Pei-Hsuan; Tseng, Chien-Chao; Feng, Vincent, System using label switching techniques to support QoS for mobile ad-hoc networks and its label distributing and switching method.
  232. McDysan, David E., System, method and apparatus that employ virtual private networks to resist IP QoS denial of service attacks.
  233. McDysan, David E., System, method and apparatus that isolate virtual private network (VPN) and best effort traffic to resist denial of service attacks.
  234. McDysan, David E., System, method and apparatus that isolate virtual private network (VPN) and best effort traffic to resist denial of service attacks.
  235. Walker, David; Sapp, Kevin; Goldschlag, David, System, method and device for mediating connections between policy source servers, corporate repositories, and mobile devices.
  236. Sapp, Kevin; Goldschlag, David; Walker, David, System, method, and device for mediating connections between policy source servers, corporate repositories, and mobile devices.
  237. Sapp, Kevin; Goldschlag, David; Walker, David, System, method, and device for mediating connections between policy source servers, corporate repositories, and mobile devices.
  238. Iyer, Aravind V.; Bellur, Bhargav R., Systems and methods for efficient authentication.
  239. Dawson, Christopher J.; Finn, Peter G.; Hamilton, II, Rick A.; Li, Jenny S.; Mullins, Philip K., Systems and methods for establishing gateway bandwidth sharing ad-hoc networks.
  240. Loh, Michael, Systems and methods for secure communication over a wireless network.
  241. Haney, Richard D., Techniques for communication within closed groups of mobile devices.
  242. Haney, Richard D., Techniques for sharing position data between first and second devices.
  243. Haney, Richard D., Techniques for sharing relative position between mobile devices.
  244. Haney, Richard D., Tracking proximity of services provider to services consumer.
  245. Apte, Manoj; Udupa, Sivprasad; Motyashov, Alex; Devarajan, Srikanth, Traffic redirection in cloud based security services.
  246. Aggarwal, Rahul, Transfer of mobile subscriber context in cellular networks using extended routing protocol.
  247. Jouppi, Jarkko; Wiljakka, Juha; Rinne, Janne; Hippeläinen, Lassi; Hurtta, Tuija; Haumont, Serge, Transmission of packet data to a wireless terminal.
  248. Hansen, Robert, Trusted zone protection.
  249. Chen, Ben Wei, Universal environment extender.
  250. Shaw, Venson; Kodaypak, Rajendra Prasad, Universal peer-to-peer signaling network virtualization and orchestration.
  251. Shah, Mehul Y.; Sanscartier, Benoit, Using windows authentication in a workgroup to manage application users.
  252. Shah, Mehul Y.; Sanscartier, Benoit, Using windows authentication in a workgroup to manage application users.
  253. Styles,Brian; Bucklew,Charles B., Validation of configuration settings prior to configuration of a local run-time environment.
  254. Anantharamiah, Prasanna; Chekka, Venkata Raghavan; Skaria, Jimmi; Kumar, Vinodh T K, Vendor-neutral policy based mechanism for enabling firewall service in an MPLS-VPN service network.
  255. Aura,Anssi Tuomas, Verifying location of a mobile node.
  256. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Virtual host for protocol transforming traffic traversing between an IP-compliant source and non-IP compliant destination.
  257. McDysan,David E., Virtual private network (VPN)-aware customer premises equipment (CPE) edge router.
  258. Daude, Olivier; Fieschi, Jacques; Galand, Claude; Hericourt, Olivier; Le Pennec, Jean Francois, Virtual private network crossovers based on certificates.
  259. Jalava, Mika, Virtual private network management.
  260. Barkan, Elad Pinhas, Wireless internet system and method.
  261. Gidwani, Sanjay M., Wireless network having real-time channel allocation.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로