$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Using packet filters and network virtualization to restrict network communications 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-009/00
  • G06F-015/16
  • G06F-017/00
  • G06F-007/04
  • G06F-007/02
  • G06F-007/58
  • G06K-009/00
  • H04L-009/00
  • G06F-015/177
출원번호 US-0695821 (2000-10-24)
발명자 / 주소
  • Hydrie,Aamer
  • Hunt,Galen C.
  • Levi,Steven P.
  • Tabbara,Bassam
  • Welland,Robert V.
출원인 / 주소
  • Microsoft Corporation
대리인 / 주소
    Lee &
인용정보 피인용 횟수 : 103  인용 특허 : 80

초록

A network mediator corresponding to a computing device uses packet filters to restrict network communications. The network mediator includes a set of one or more filters, each filter having parameters that are compared to corresponding parameters of a data packet to be passed through the network med

대표청구항

The invention claimed is: 1. A computing device comprising: a set of filters; a mapping of virtual addresses to network addresses; and a controller, coupled to the set of filters and the mapping, to, access, upon receipt of a data packet requested to be sent from the computing device to a target de

이 특허에 인용된 특허 (80)

  1. Keith Franklin Falck ; Chinmei Chen Lee, Arrangement of delivering internet protocol datagrams for multimedia services to the same server.
  2. Bixler David C. ; Hilger Eufemia P. ; Smith Jeffrey A. ; Wittlin Mark R. ; Siegel Neil G., Automated configuration of internet-like computer networks.
  3. Hunt Galen C., Automatic detection of per-unit location constraints.
  4. Salo, Randy; Van Hamersveld, Chris; Shelton, Barry K.; Herbinaux, Larry; Deacon, D. Brian; Fayal, Jr., Kenneth Eugene, CLIENTS REMOTE ACCESS TO ENTERPRISE NETWORKS EMPLOYING ENTERPRISE GATEWAY SERVERS IN A CENTRALIZED DATA CENTER CONVERTING PLURALITY OF DATA REQUESTS FOR MESSAGING AND COLLABORATION INTO A SINGLE REQU.
  5. Saitoh Fumihiko (Ryuuohchou JPX), Character recognition system using the generalized hough transformation and method.
  6. Nguyen, Nam; Kosacek, Michael, Cluster-based system and method of recovery from server failures.
  7. Chu Hsiao-keng J., Cross-domain data transfer using deferred page remapping.
  8. Srini Krishnamurthy ; Sunil Sharad Mehta ; Cary Bailey O'Brien, DEVICE MANAGEMENT SYSTEM FOR MANAGING STANDARDS-COMPLIANT AND NON-COMPLIANT NETWORK ELEMENTS USING STANDARD MANAGEMENT PROTOCOLS AND A UNIVERSAL SITE SERVER WHICH IS CONFIGURABLE FROM REMOTE LOCATION.
  9. Mark Robert Funk ; Gera Goft IL; Dimitry Kloper IL; Shlomit Pinter IL; Esther Yeger-Lotem IL, Delivery of configuration change in a group.
  10. Hossein Moiin ; Ronald Widyono ; Ramin Modiri, Determining cluster membership in a distributed computer system.
  11. See Michael E. ; Bailey John W. ; Panza Charles L. ; Pikover Yuri ; Stone Geoffrey C., Deterministic user authentication service for communication network.
  12. Pulsipher Eric A. ; Smith Darren D. ; Ruffatto Dominic L., Distributed internet monitoring system and method.
  13. Gudjonsson, Gudjon M.; Emilsson, Kjartan Pierre, Distributed system to intelligently establish sessions between anonymous users over various networks.
  14. Stuart Eichert ; Danny M. Nessett ; Wenjun Luo ; Elaine Lusher, Dynamic policy management apparatus and method using active network devices.
  15. Liu Howard T. (San Marino CA) Silvester John A. (Los Angeles CA), Dynamic resource allocation scheme for distributed heterogeneous computer systems.
  16. Wesinger, Jr., Ralph E.; Coley, Christopher D., Firewall providing enhanced network security and user transparency.
  17. Hacherl Donald J., Floating single master operation.
  18. Scott L. Wiegel, Graphical network security policy management.
  19. Michael F. Deering ; Nathaniel David Naegle ; Scott R. Nelson, Graphics system configured to perform parallel sample to pixel calculation.
  20. Mahon, Hugh F; Durham, David M; Tang, Puqi, Grouping targets of management policies.
  21. James W. Arendt ; Ching-Yun Chao ; Rodolfo Ausgusto Mancisidor, Highly scalable and highly available cluster system management scheme.
  22. Walker ; Jr. Kenneth ; Wilson Gregory Alan, Method and apparatus for an account managed object class model in a distributed computing environment.
  23. Abu El Ata Nabil A., Method and apparatus for designing and analyzing information systems using multi-layer mathematical models.
  24. Kumar, Krishna; Murphy, Declan J.; Hisgen, Andrew L., Method and apparatus for dynamically altering configurations of clustered computer systems.
  25. Bal, Subhash; Iyer, Raghunath; Iyer, Sundar; Rao, Ramana, Method and apparatus for high-speed network rule processing.
  26. Chopra, Vikram; Desai, Ajay; Iyer, Raghunath; Iyer, Sundar; Jiandani, Moti; Shelat, Ajit; Yadav, Navneet, Method and apparatus for high-speed network rule processing.
  27. Gai, Silvano; McCloghrie, Keith; Mohaban, Shai, Method and apparatus for identifying network data traffic flows and for applying quality of service treatments to the flows.
  28. Kumar, Krishna; Murphy, Declan J.; Hisgen, Andrew L.; Block, Robert, Method and apparatus for managing operations of clustered computer systems.
  29. Arad Naveh ; Itzhak Parnafes ; Shai Mohaban ; Steven M. Woo, Method and apparatus for policy-based management of quality of service treatments of network data traffic flows by integrating policies with application programs.
  30. Basani, Vijay R.; Mangiapudi, Krishna; Murach, Lynne M.; Karge, Leroy R.; Revsin, Vitaly S.; Bestavros, Azer; Crovella, Mark E.; LaRosa, Domenic J., Method and apparatus for scalable distribution of information in a distributed network.
  31. Schmidt Thomas J., Method and apparatus for secure remote programming of firmware and configurations of a computer over a network.
  32. Otsuka Kazuhiro,JPX ; Horikoshi Tsutomu,JPX ; Suzuki Satoshi,JPX, Method and equipment for extracting image features from image sequence.
  33. Wollrath, Ann M.; Waldo, James H.; Arnold, Kenneth C. R. C., Method and system for leasing storage.
  34. Short Robert T. ; Gamache Rod ; Massa Michael T. ; Vert John D., Method and system for resource monitoring of disparate resources in a server cluster.
  35. Saito Naoki ; Bennett Nicholas N. ; Burridge Robert, Method of determining dips and azimuths of fractures from borehole images.
  36. Sheikh, Tahir Q.; Johnson, Karl S.; Nguyen, Ken, Method of remote access and control of environmental conditions.
  37. Novaes, Marcos N.; Laib, Gregory D.; Lucash, Jeffrey S.; Goering, Ronald T.; Sohos, George, Method, system and program products for defining nodes to a cluster.
  38. Coss Michael John ; Majette David L. ; Sharp Ronald L., Methods and apparatus for a computer network firewall with stateful packet filtering.
  39. Rodney A. DeKoning ; Ray M. Jantz ; William V. Courtright, II, Methods and apparatus for committing configuration changes to managed devices prior to completion of the configuration change.
  40. Jantz, Ray M.; DeKoning, Rodney A.; Courtright, II, William V.; Markus, Matthew A., Methods and apparatus for performing mass operations on a plurality of managed devices on a network.
  41. Rowland Patricia J. ; Kreeger Kevin A. ; Sanders Albert R., Model-based feature tracking system.
  42. Sarit Mukherjee ; Ibrahim Kamel ; Prasant Mohapatra, Multimedia file systems using file managers located on clients for managing network attached storage devices.
  43. Jain Lalit ; Ford Michael T., Network device for supporting construction of virtual local area networks on arbitrary local and wide area computer networks.
  44. Engel Ferdinand ; Jones Kendall S. ; Robertson Kary ; Thompson David M. ; White Gerard, Network monitoring.
  45. Waldo James H. (Dracut MA) Arnold Kenneth C. (Newton Centre MA) Erdos Marlena E. (Somerville MA) Robinson Douglas B. (Hollis NH) Hoffman D. Jeffrey (Nashua NH) Smith Lamar D. (San Jose CA) Showman Pe, Object oriented distributed computing system processing request to other object model with code mapping by object manage.
  46. Pfeil John M. ; Mennenga Kenneth A., Production of statistically-based network maps.
  47. Gong Li, Protection domains to provide security in a computer system.
  48. Ernest C. Coskrey, IV ; Vernon K. Boland ; Harold B. Raynor ; Steven R. McDowell, Quorum arbitrator for a high availability system.
  49. van Ingen, Catharine; Kusters, Norbert P.; Gamache, Rod N.; Rinne, Robert D., Quorum resource arbiter within a storage network.
  50. Saeki Takao (Ann Arbor MI), Real time implementation of the hough transform.
  51. Epstein, III, Edwin A.; Souvannavong, Souk; Lu, Chia-Sheng, Resistance cell architecture.
  52. Robert A Wipfel ; David Murphy, Resource management in a clustered computer system.
  53. Robert A Wipfel ; David Murphy, Resource management in a clustered computer system.
  54. Wipfel Robert A ; Murphy David, Resource management in a clustered computer system.
  55. McNally Michael ; Vetter Brian Jay, Resource model configuration and deployment in a distributed computer network.
  56. Ernest C. Coskrey, IV, Resource protection in a cluster environment.
  57. Sharma, Rosen; Keshav, Srinivasan, Restricting communication between network devices on a common network.
  58. Van Renesse, Robbert, Scalable computer network resource monitoring and location system.
  59. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for Web based data management.
  60. Mayes, John C.; Coile, Brantley W., Security system for network address translation systems.
  61. Albert, Mark; Howes, Richard A.; Jordan, James A.; Kersey, Edward A.; Menditto, Louis F.; O'Rourke, Chris; Tiwari, Pranav Kumar; Tsang, Tzu-Ming, Sending instructions from a service manager to forwarding agents on a need to know basis.
  62. Matsunaga Shinichi,JPX, Straight line detecting method.
  63. Boden Edward B. ; Brzozowski Wesley A. ; Bullock Mark C. ; Parks Scott B. ; Williams Michael D., System and method for IP network address translation and IP filtering with dynamic address resolution.
  64. Boden, Edward B.; Brzozowski, Wesley A.; Gruber, Franklin A.; Palermo, Donald A.; Williams, Michael D., System and method for IP network address translation using selective masquerade.
  65. Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V.; Tabbara, Bassam; Levi, Steven P.; Rehof, Jakob, System and method for designing a logical model of a distributed computer system and deploying physical resources according to the logical model.
  66. Modiri Ramin ; Moiin Hossein,GBX, System and method for determining cluster membership in a heterogeneous distributed system.
  67. Nassar, Ayman, System and method for dynamic simultaneous connection to multiple service providers.
  68. Michael W. Dennis ; Michele L. Freed ; Daniel Plastina ; Eric R. Flo ; David E. Kays, Jr. ; Robert E. Corrington, System and method for implementing group policy.
  69. Moiin Hossein, System and method for modifying membership in a clustered distributed computer system and updating system configuration.
  70. Taylor, Kevin R.; Murugesan, Ganesh; Tajalli, Homayoon, System and method for network access control using adaptive proxies.
  71. Krishna, Gopal S.; Chow, Peter Ka-Fai; Viswanath, Somnath; Tzeng, Shr-Jie; Kanuri, Mrudula, System and method for network management of local area networks having non-blocking network switches configured for switching data packets between subnetworks based on management policies.
  72. Badovinatz Peter Richard ; Brenner Larry Bert ; Chandra Tushar Deepak ; Kirby Orvalle Theodore ; Pershing ; Jr. John Arthur, System for utilizing batch requests to present membership changes to process groups.
  73. Paul Weschler, System, method and computer program product for searching for, and retrieving, profile attributes based on other target profile attributes and associated profiles.
  74. Christopher Ambler ; Andrew Wallace, System, method, and computer program product for workflow processing using internet interoperable electronic messaging with mime multiple content type.
  75. Christopher Sean Johnson, Systems and methods for multiple mode voice and data communications using intelligently bridged TDM and packet buses and methods for implementing language capabilities using the same.
  76. Audebert, Yves, Terminal and system for performing secure electronic transactions.
  77. Lee, David C.; Wang, Peter S. S.; O'Connell, Anne G., Transparent access to network attached devices.
  78. Seid Howard A. ; Lespagnol Albert,FRX, Virtual private network.
  79. Sheard Nicolas C. ; Fischer Larry J. ; Matthews Richard W. ; Gurla Himabindu ; Hu Qilin ; Zheng Wendy J. ; Mow Boyle Y., Visual data integration system and method.
  80. Anderson, Todd A.; Johnson, Douglas G.; Seaser, James G.; Tucker, Daniel G., Window operator.

이 특허를 인용한 특허 (103)

  1. Spry, Andrew J., Accelerating internet small computer system interface (iSCSI) proxy input/output (I/O).
  2. Spry, Andrew J., Accelerating internet small computer system interface (iSCSI) proxy input/output (I/O).
  3. Welch, Ivo, Anti-identity-theft method and hardware database device.
  4. Brown, Mathilde C.; Chase, Charlie D.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Noble, David; Outhred, Geoffrey; Peterson, Glenn R.; Tabbara, Bassam; Torone, Alexander; Welland, Robert V., Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  5. Hunt, Galen C.; Tabbara, Bassam; Grealish, Kevin; Outhred, Geoffrey; Mensching, Rob, Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  6. Hunt, Galen C.; Tabbara, Bassam; Grealish, Kevin; Outhred, Geoffrey; Mensching, Rob, Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  7. Ahuja, Ratinder Paul Singh; Deninger, William; de la Iglesia, Erik; Lowe, Rick, Attributes of captured objects in a capture system.
  8. Ahuja, Ratinder Paul Singh; Deninger, William; de la Iglesia, Erik; Lowe, Rick, Attributes of captured objects in a capture system.
  9. Deninger, William; de la Iglesia, Erik, Attributes of captured objects in a capture system.
  10. Deninger, William; de la Iglesia, Erik, Attributes of captured objects in a capture system.
  11. Deninger, William; de la Iglesia, Erik, Attributes of captured objects in a capture system.
  12. Cohn, Daniel Todd, Authorizing communications between computing nodes.
  13. Tsujimoto, Shohei, Communication apparatus.
  14. Yanagi, Satoru, Communication apparatus.
  15. Gaitonde, Jitendra B., Configuration management for a capture/registration system.
  16. Ahuja, Ratinder Paul Singh; Coleman, Shaun; de la Iglesia, Erik, Cryptographic policy enforcement.
  17. Lowe, Rick; Brocker, Stephen, Database for a capture system.
  18. Outhred, Geoffrey; Grealish, Kevin; Mensching, Rob; Tabbara, Bassam, Design time validation of systems.
  19. Gefflaut, Alain; Müller, Ulrich, Device virtualization.
  20. Ahuja, Ratinder Paul Singh; Howard, Matthew; Lowe, Rick; de la Iglesia, Erik; Deninger, William, Document de-registration.
  21. Ahuja, Ratinder Paul Singh; Howard, Matthew; Lowe, Rick; de la Iglesia, Erik; Deninger, William, Document de-registration.
  22. Ahuja, Ratinder Paul Singh; Howard, Matthew; Lowe, Rick; de la Iglesia, Erik; Deninger, William, Document registration.
  23. Ahuja, Ratinder Paul Singh; Howard, Matthew; Lowe, Rick; de la Iglesia, Erik; Deninger, William, Document registration.
  24. Elfner, Axel E., Facilitating the sending of mail from a restricted communications network.
  25. Elfner, Axel E., Facilitating the sending of mail from a restricted communications network.
  26. Kapadia, Shamit, Fast update filter.
  27. Lowe, Rick; Broeker, Stephen; Liu, Weimin, File system for a capture system.
  28. Salmi, Matti, Filtering of electronic information to be transferred to a terminal.
  29. Hydrie, Aamer; Joy, Joseph M.; Welland, Robert V., Flexible network load balancing.
  30. Liu, Weimin; de la Iglesia, Erik; Deninger, William; Lowe, Rick; Broeker, Stephen, High speed packet capture.
  31. Deninger, William; de la Iglesia, Erik, Identifying image type in a capture system.
  32. Deninger, William; de la Iglesia, Erik, Identifying image type in a capture system.
  33. Hunt, Galen C.; Outhred, Geoffrey; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob, Integrating design, deployment, and management phases for systems.
  34. Wang, Huei; Srinivas, Nk; Palekar, Ashwin; Ivanova, Olga B.; Hagiu, Costin; Beletski, Rouslan; Sampath, Sriram; Lukose, Seema J., Internet protocol (IP) address virtualization for terminal server sessions.
  35. Deninger, William; Ahuja, Ratinder Paul Singh; de la Iglesia, Erik, Locational tagging in a capture system.
  36. Overby, Jr., Linwood H.; Smith, Jeffery L., Managing remote host visibility in a proxy server environment.
  37. Gan, Der-Hwa, Method and apparatus for computing a backup path using fate-sharing information.
  38. de la Iglesia, Erik; Lowe, Rick; Ahuja, Ratinder Paul Singh; Deninger, William; King, Samuel; Khasgiwala, Ashish; Massaro, Donald J., Method and apparatus for data capture and analysis system.
  39. de la Iglesia, Erik; Lowe, Rick; Ahuja, Ratinder Paul Singh; Deninger, William; King, Samuel; Khasgiwala, Ashish; Massaro, Donald J., Method and apparatus for data capture and analysis system.
  40. Aoki, Kentaro; Moriya, Yukinobu; Shimizu, Naoto; Saitoh, Shinichiroh, Method and apparatus for dynamic destination address control in a computer network.
  41. Aoki, Kentaro; Moriya, Yukinobu; Shimizu, Naoto; Saitoh, Shinichiroh, Method and apparatus for dynamic destination address control in a computer network.
  42. Shankar, Laxman, Method and apparatus for filtering packet data in a network device.
  43. Shankar,Laxman, Method and apparatus for filtering packet data in a network device.
  44. Falls, Patrick Terence, Method and apparatus for implementing virtual proxy to support heterogeneous systems management.
  45. Grynberg,Amiram, Method and system for controlling the use of addresses using address computation techniques.
  46. Fertell, David A.; Field, Jr., Joseph I., Method for managing computer network access.
  47. Anand,Vaijayanthimala K., Method, computer program product, and data processing system for data queuing prioritization in a multi-tiered network.
  48. Outhred, Geoffrey; Han, Eric K; Grealish, Kevin D. J.; Brown, Mathilde C.; Gustin, Reid B; Mensching, Rob; Nielsen, Steven T, Model and system state synchronization.
  49. Vinberg, Anders B.; Copeland, Bruce W.; Fries, Robert; Grealish, Kevin D. J.; Hardwick, Jonathan C.; Healy, Michael J.; Hunt, Galen C.; Hydrie, Aamer; James, David C.; Lakshminarayanan, Anand; Lassettre, Edwin R.; McCollum, Raymond W.; Mensching, Rob; Mohammed, Mazhar; Narayanan, Rajagopalan Badri; Outhred, Geoffrey H.; Pan, Zhengkai Kenneth; Papaefstathiou, Efstathios; Parchem, John M.; Rajarajan, Vij; Sanghvi, Ashvinkumar J.; Tabbara, Bassam; Vega, Rene Antonio; Voloshin, Vitaly; Welland, Robert V.; Wilson, John H.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based policy application.
  50. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Pardyak, Przemek; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based provisioning of test environments.
  51. Vinberg, Anders B.; Lakshminarayanan, Anand; Sanghvi, Ashvinkumar J.; Rajarajan, Vij; Voloshin, Vitaly; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system monitoring.
  52. Vinberg, Anders B.; Lakshminarayanan, Anand; Sanghvi, Ashvinkumar J.; Rajarajan, Vij; Voloshin, Vitaly; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system monitoring.
  53. Vinberg, Anders B.; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system provisioning.
  54. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  55. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  56. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  57. Gbadegesin, Abolade; House, Sean B.; Hydrie, Aamer; Joy, Joseph M.; Kaniyar, Sanjay N.; Welland, Robert V., Network load balancing with connection manipulation.
  58. Darling, Christopher L.; Joy, Joseph M.; Shrivastava, Sunita; Subbaraman, Chittur, Network load balancing with host status information.
  59. Joy, Joseph M.; Sivathanup, Karthic Nadarajapillai, Network load balancing with session information.
  60. Darling, Christopher L.; House, Sean B.; Hydrie, Aamer; Joy, Joseph M.; Welland, Robert V., Network load balancing with traffic routing.
  61. Deninger, William; de la Iglesia, Erik, Object classification in a capture system.
  62. Li, Nan; Wang, Linchun, Packet edit processing method and related device.
  63. de la Iglesia, Erik; Deninger, William; Ahuja, Ratinder Paul Singh, Query generation for a capture system.
  64. de la Iglesia, Erik; Deninger, William; Ahuja, Ratinder Paul Singh, Query generation for a capture system.
  65. de la Iglesia, Erik; Deninger, William; Ahuja, Ratinder Paul Singh, Query generation for a capture system.
  66. Aoki, Kentaro; Moriya, Yukinobu; Kagawa, Izumi, Restricting communication service.
  67. Aoki,Kentaro; Moriva,Yukinobu; Kagawa,Izumi, Restricting communication service.
  68. de la Iglesia, Erik; Deninger, William, Rule parser.
  69. de la Iglesia, Erik; Deninger, William J., Rule parser.
  70. Hunt, Galen C.; Simon, Jeff, Secure domain join for computing devices.
  71. Freeman, Trevor W.; Moore, Tim; Aboba, Bernard, Security associations for devices.
  72. de la Iglesia, Erik; Ahuja, Ratinder Paul Singh; Deninger, William; King, Sam, Signature distribution in a document registration system.
  73. Ahuja, Ratinder Paul Singh; Deninger, William; Lakhani, Faizel; Christner, Joel, System and method for concept building.
  74. Anand,Vaijayanthimala K., System and method for connection capacity reassignment in a multi-tier data processing system network.
  75. Ahuja, Ratinder Paul Singh; Lakhani, Faizel, System and method for data mining and security policy management.
  76. Ahuja, Ratinder; Lakhani, Faizel, System and method for data mining and security policy management.
  77. Ahuja, Ratinder; Lakhani, Faizel, System and method for data mining and security policy management.
  78. Liu, Weimin, System and method for data mining and security policy management.
  79. Liu, Weimin, System and method for data mining and security policy management.
  80. Liu, Weimin, System and method for data mining and security policy management.
  81. Hunt, Galen C.; Hydrie, Aamer; Levi, Steven P.; Stutz, David S.; Tabbara, Bassam; Welland, Robert V., System and method for distributed management of shared computers.
  82. Hunt, Galen C.; Hydrie, Aamer; Levi, Steven P.; Stutz, David S.; Tabbara, Bassam; Welland, Robert V., System and method for distributed management of shared computers.
  83. Jreij, Elie A.; Chieng, Darrell L.; Cochran, Stephen D.; Hrustemovic, Nasiha; Wang, James C., System and method for filtering communications at a network interface controller.
  84. Kang, Brent ByungHoon, System and method for implementing a hidden server.
  85. Deninger, William; Ahuja, Ratinder Paul Singh; Cheung, Lee C., System and method for intelligent state management.
  86. Deninger, William; Ahuja, Ratinder Paul Singh; Cheung, Lee C., System and method for intelligent state management.
  87. Deninger, William; Ahuja, Ratinder Paul Singh; Cheung, Lee C., System and method for intelligent state management.
  88. Ahuja, Ratinder Paul Singh; Deninger, William, System and method for intelligent term grouping.
  89. Levi, Steven; Hunt, Galen; Hydrie, Aamer; Rehof, Jakob; Tabbara, Bassam; Welland, Robert, System and method for logical modeling of distributed computer systems.
  90. Ahuja, Ratinder Paul Singh; Christener, Joel; Gaitonde, Jitendra; Ganti, Sirisha; Haridasa, Sridevi; Hegde, Damodar K.; Jayaram, Chaitra; Kasim, Rahila; Lakhani, Faizel; Patil, Swati; Sandhu, Harsimran S., System and method for managing data and policies.
  91. Ahuja, Ratinder Paul Singh; Deninger, William J., System and method for protecting specified data combinations.
  92. Ahuja, Ratinder Paul Singh; Deninger, William J., System and method for protecting specified data combinations.
  93. Ahuja, Ratinder Paul Singh; Jha, Bimalesh; Maini, Nitin; Patel, Sujata; Jain, Ankit R.; Hegde, Damodar K.; Nanganure, Rajaram V.; Pawar, Avinash Vishnu, System and method for providing data protection workflows in a network environment.
  94. Ahuja, Ratinder Paul Singh; Jha, Bimalesh; Maini, Nitin; Patel, Sujata; Jain, Ankit R.; Hegde, Damodar K.; Nanganure, Rajaram V.; Pawar, Avinash Vishnu, System and method for providing data protection workflows in a network environment.
  95. Anand,Vaijayanthimala K., System and method for request priority transfer across nodes in a multi-tier data processing system network.
  96. Deninger, William; de la Iglesia, Erik, System and method for word indexing in a capture system and querying thereof.
  97. Deninger, William; de la Iglesia, Erik, System and method for word indexing in a capture system and querying thereof.
  98. de la Iglesia, Erik; Lowe, Rick; Ahuja, Ratinder Paul Singh; Coleman, Shaun; King, Samuel; Khasgiwala, Ashish, Tag data structure for maintaining relational data over captured objects.
  99. de la Iglesia, Erik; Lowe, Rick; Ahuja, Ratinder Paul Singh; Coleman, Shaun; King, Samuel; Khasgiwala, Ashish, Tag data structure for maintaining relational data over captured objects.
  100. Lowe, Rick; Coleman, Shaun; de la Iglesia, Erik; King, Samuel; Khasgiwala, Ashish, Verifying captured objects before presentation.
  101. Lowe, Rick; Coleman, Shaun; de la Iglesia, Erik; King, Samuel; Khasgiwala, Ashish, Verifying captured objects before presentation.
  102. Nomura, Ken, Video storage system.
  103. Beloussov, Serguei M.; Protassov, Stanislav S.; Tormasov, Alexander G., Virtual private server with CPU time scheduler and isolation of system components.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로