$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Systems and methods for continuing an operation interrupted from a reconnection between a client and server 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/16
  • G06F-015/18
출원번호 US-0157315 (2005-06-20)
등록번호 US-7340772 (2008-03-04)
발명자 / 주소
  • Panasyuk,Anatoliy
  • Kramer,Andre
  • Pedersen,Bradley Jay
  • Stone,David Sean
  • Treder,Terry
출원인 / 주소
  • Citrix Systems, Inc.
대리인 / 주소
    Choate, Hall & Stewart, LLP
인용정보 피인용 횟수 : 161  인용 특허 : 185

초록

The invention relates to methods and systems for reconnecting a client and providing user authentication across a reliable and persistent communication session. A first protocol that encapsulates a plurality of secondary protocols is used to communicate over a network. A first protocol service, usin

대표청구항

What is claimed is: 1. A method for continuing an interrupted operation between a client and a server, the method comprising the steps of: (a) providing, by a first protocol service, a first connection between a client and the first protocol service, and a second connection between the first protoc

이 특허에 인용된 특허 (185)

  1. Barzilai Tsipora P. (Millwood NY) Bird Raymond F. (Durham NC) Gray James P. (Chapel Hill NC) Kadaba Bharath K. (Peekskill NY) Kalmbach ; Jr. James B. (Raleigh NC) Knauth Jeffrey G. (Raleigh NC) Pozef, Adaptive session-level pacing.
  2. Orsic Milo, Address updating of wireless mobile terminal hosts affiliated with a wired network.
  3. Doviak William ; Whitmore David L. ; Houvig Flex, Apparatus and method for intelligent routing of data between a remote device and a host system.
  4. Katiyar Dinesh, Apparatus and method for operating an aggregation of server computers using a dual-role proxy server computer.
  5. Vu Hung T. (Ottawa CAX), Apparatus and method for providing a secure gateway for communication and data exchanges between networks.
  6. Alegre Alfred A. ; Sha Rong Q. ; Soley William R., Apparatus and method for providing trusted network security.
  7. Doviak William ; Whitmore David L., Apparatus and method for transparent wireless communication between a remote device and a host system.
  8. William Doviak ; David L. Whitmore ; Flex Houvig, Apparatus and method for transparent wireless communication between a remote device and host system.
  9. Bhatia Rajiv ; Stypko Gregory H. ; Zhang Siuling C., Apparatus and methods for use therein for an ISDN LAN modem that displays fault information to local hosts through interception of host DNS request messages.
  10. Keith Franklin Falck ; Chinmei Chen Lee, Arrangement of delivering internet protocol datagrams for multimedia services to the same server.
  11. Hayden Charles C. (Fair Haven NJ) Schmidt Frederick A. (Middletown NJ) Studebaker Mark D. (Red Bank NJ), Audiographics conferencing arrangement.
  12. Russell Edward A. (Acton MA), Authorization system for obtaining in single step both identification and access rights of client to server directly fro.
  13. Hamadani Mehrdad ; Huffman Ward, Automatic software license manager.
  14. Gordon, Barry; Baranoff, Keith Andrew; Davies, Keith; Hollows, Robin L., Autonomously established secure and persistent internet connection and autonomously reestablished without user intervention that connection if it lost.
  15. Natarajan Kadathur S. (Millwood NY) Huang Chia-Chi (Yorktown Heights NY), Battery efficient operation of scheduled access protocol.
  16. Dixon Michael D., Bi-directional process-to-process byte stream protocol.
  17. Harwood Jonathan P. ; Kimmeth Thomas ; Nusbaum Kurt, Bifurcated transaction system in which nonsensitive information is exchanged using a public network connection and sensitive information is exchanged after automatically configuring a private network.
  18. Freeburg Thomas A. (Arlington Heights IL) Dautel Donald F. (Glendale Heights IL), Cellular data telephone system and cellular data telephone therefor.
  19. Pettus Christopher E. (San Francisco CA) Loomis Donald R. (Saratoga CA) Warren Christina E. (Cupertino CA), Client server system and method of operation including a dynamically configurable protocol stack.
  20. Bittinger Reed Richard ; Fraenkel Michael Levi ; Housel ; III Barron Cornelius ; Lindquist David Bruce, Client/server communication system.
  21. Regnier Barbara Ann (Mazeppa MN) Youngers David Nicholas (Rochester MN), Client/server computer systems having control of client-based application programs, and application-program control mean.
  22. Scherpbier Andrew W., Collaborative web browser.
  23. Demery David A.,NLX ; Zijderhand Frans,NLX ; Mulder Edwin W.,NLX, Communication system for use with stationary and second entities, via a wireless intermediate network with gateway devic.
  24. Bird Raymond F. (Durham NC) Britton Kathryn H. (Chapel Hill NC) Chung Tein-Yaw D. (Cary NC) Edwards Allan K. (Raleigh NC) Mathew Johny (Chapel Hill NC) Pozefsky Diane P. (Chapel Hill NC) Sarkar Soumi, Compensation for mismatched transport protocols in a data communications network.
  25. Imai, Isao, Computer system for controlling a data transfer.
  26. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Computer system security method and apparatus having program authorization information data structures.
  27. Kalajan Kevin E. ; Mueller Thomas R., Connection-oriented session emulation.
  28. Prestas, Gregory; DeWilde, Mark A.; Goldner, Jeffrey S.; Kelleher, Terence M.; Khezri, Said Rahmani, Creating virtual private connections between end points across a SAN.
  29. Ross ; Jr. Robert C., Cryptographic communication system.
  30. Schuster Guido M. ; Mahler Jerry ; Sidhu Ikhlaq ; Borella Michael, Data and real-time media communication over a lossy network.
  31. Jean-Paul Accarie FR, Data processing apparatus with communication feature, and communication method in a data processing apparatus.
  32. Kauffman Marc W. (Ft. Washington PA), Data security scheme for point-to-point communication sessions.
  33. Kedar Benjamin (St. Petersburg FL) Michalak Gerald P. (St. Petersburg FL), Data switching system and method.
  34. Hershey John E. (Ballston Lake NY), Datagram message communication service employing a hybrid network.
  35. Henderson Kenneth R. (Sarasota FL) Koski Robert E. (Sarasota FL) Barlow Christopher R. (Sarasota FL), Decentralized distributed asynchronous object oriented system and method for electronic data management, storage, and co.
  36. Miyagi Morihito (Tokyo JPX), Defect notification method in a multipoint ATM network.
  37. Rothwein Thomas M. ; Coker John L., Determining the visibility to a remote database client.
  38. Ahuja Sudhir Raman, Disconnection management system for wireless voice communications.
  39. Miller Steven P. (Newton MA) Lampson Butler W. (Cambridge MA), Distributed configuration profile for computing system.
  40. Natarajan Kadathur S. (Millwood NY), Distributed control methods for management of migrating data stations in a wireless communications network.
  41. Bauer Eric (Freehold NJ) Schaffer Russel W. (Ocean Grove NJ), Dynamic binding of network identities to locally-meaningful identities in computer networks.
  42. Miyahara Gary K. (Rancho Palos Verdes CA), Efficient security kernel for the 80960 extended architecture.
  43. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  44. Carter Matthew ; Costantini Frank ; Kleidermacher Moishe ; McGrogan Ellwood ; Paraggio Ronald, Encryption and authentication methods and apparatus for securing telephone communications.
  45. Parker Robert D. ; Holloway Matthew S., File privilege administration apparatus and methods.
  46. Guido M. Schuster ; Jerry Mahler ; Ikhlaq Sidhu ; Michael Borella, Forward error correction system for packet based real time media.
  47. Schuster Guido M. ; Mahler Jerry ; Sidhu Ikhlaq ; Borella Michael, Forward error correction system for packet based real time media.
  48. Schuster Guido M. ; Mahler Jerry ; Sidhu Ikhlaq ; Borella Michael, Forward error correction system for packet based real time media.
  49. Peter David Niblett GB; Karen Louise Randell GB, Gateway for converting synchronous client/server protocols into asynchronous messaging protocols and storing session state information at the client.
  50. Preston Dan A. ; Preston Joseph, Geo-spacial Internet protocol addressing.
  51. Weaver Edward A. (Toledo OH), Glasses suitable for sealing ferrites.
  52. Harrison Colin G. (Brookfield CT), Handoff method and apparatus for mobile wireless workstation.
  53. Perkins Charles E. (Ossining NY), Highly dynamic destination-sequenced destination vector routing for mobile computers.
  54. Fischer Michael A. (San Antonio TX), Input/output network for computer system.
  55. Wrabetz Joan M. (New Hope MN) Mason ; Jr. D. Dean (Minnetonka MN) Gooderum Mark P. (Bloomington MN), Integrated remote execution system for a heterogenous computer network environment.
  56. Gervais Joseph L. ; Natarajan Alampoondi E. ; Allen Michael D. ; Perlman Radia J., Internetwork address mapping gateway.
  57. Hershey Antoinette F. (Acton MA) French Andrew H. (Lexington MA) Boire Christopher P. (Westborough MA), License mangagement system and license storage key.
  58. de Silva, Mahinda K.; Tulshibagwale, Atul; Yuan, Xinhong, Local hosting of digital certificate services.
  59. Wood, David L.; Weschler, Paul; Norton, Derk; Ferris, Chris; Wilson, Yvonne; Soley, William R., Log-on service providing credential level change without loss of session continuity.
  60. John E. Parsons, Jr. ; Bradley J. Graziadio ; Oshoma Momoh, Maintaining a first session on a first computing device and subsequently connecting to the first session via different computing devices and adapting the first session to conform to the different com.
  61. Wyman Robert M. (Kirkland WA), Management interface for license management system.
  62. Kobayashi Naofumi,JPX ; Shikata Kiyotaka,JPX ; Sekihata Osamu,JPX, Means for maintaining connectable access points owing to movement of a mobile station between cells in a wireless LAN s.
  63. Kaiser Karl-Heinz (Tamm DEX) Lohner Herbert (Friolzheim DEX) Mathony Hans-Joerg (Stuttgart-Botnang DEX) Unruh Jan (Vaikingen DEX) Zurmuehl Uwe (Hildesheim DEX) Brunke Udo (Diekholzen DEX) Glasser Jue, Method & apparatus for data exchange in data processing installations.
  64. Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven cond.
  65. Gleeson Bryan J. (Cupertino CA) Altmaier Paulette R. (Cupertino CA), Method and apparatus for connecting a node to a wireless network using a standard protocol.
  66. Dowling, Eric M., Method and apparatus for cosocket telephony.
  67. Ross Cliff D. (Pleasant Grove UT) Taylor Neil W. (Springville UT), Method and apparatus for electronic license distribution.
  68. Cooper Thomas Edward ; Phillips Hudson Wayne ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption.
  69. Hop David D. (Phoenix AZ), Method and apparatus for error-free digital data transmission during cellular telephone handoff, etc..
  70. Hamilton Graham ; Kessler Peter B. ; Nisewanger Jeffrey D. ; Bishop Alan ; Pelegri-Llopart Eduardo, Method and apparatus for generically handling diverse protocol method calls in a client/server computer system.
  71. Jay R. Gelman ; J. Scott Stadler, Method and apparatus for improving efficiency of TCP/IP protocol over high delay-bandwidth network.
  72. Jones Timothy Leonard (Austin TX) Moreland Paula Jean (Austin TX), Method and apparatus for installing software.
  73. Aziz Ashar (Fremont CA), Method and apparatus for key-management scheme for use with internet protocols at site firewalls.
  74. McKay Douglas B. (Potomac MD) Morten Richard M. (Gaithersburg MD) Marsili Michael P. (Middletown MD), Method and apparatus for linking SNA terminals to an SNA host over a packet switched communications network.
  75. Morten Richard M. (Gaithersburg MD) Smith Ted P. (Frederick MD), Method and apparatus for linking an SNA host to a remote SNA host over a packet switched communications network.
  76. Grube Gary W. (Palatine IL) Markison Timothy W. (Austin TX) Rybicki Mathew A. (Austin TX), Method and apparatus for preventing unauthorized monitoring of wireless data transmissions.
  77. Asakawa, Shigenobu; Iseki, Yutaka, Method and apparatus for producing ceramic green sheet.
  78. Thompson Suzanne M. (Lexington KY), Method and apparatus for protecting software executing on a demonstration computer.
  79. Samadi Behrokh (22 Longview Dr. Holmdel NJ 07733) Sohraby Kazem A. (116 University Dr. Lincroft NJ 07738), Method and apparatus for providing continuation of a communication call across multiple networks.
  80. Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olson, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  81. Nagel Robert (New York NY) Lipscomb Thomas H. (New York NY), Method and apparatus for retrieving selected information from a secure information source.
  82. Watson Colin ; Herron Andrew M., Method and apparatus for supporting multiple, simultaneous services over multiple, simultaneous connections between a cl.
  83. Bellare Mihir M. (New York NY) Rogaway Phillip W. (Austin TX), Method and apparatus for three-party entity authentication and key distribution using message authentication codes.
  84. Gu, Ke-Qin; Chen, Tsung-Yen (Eric); Han, Ching-Chih (Jason); Lee, Kuo-Chun, Method and apparatus implemented in a firewall for communicating information between programs employing different protocols.
  85. Ahlberg Bjorn G. D. (Falsterbo SEX) Falk Johan (Cary NC) Molne Anders (Cary NC), Method and apparatus of maintaining an open communications channel between a cellular terminal and an associated cellula.
  86. Skopp Peter ; Vitale Benjamin F. ; Marur Vinod R. ; Tse Clifford S.C. ; Dulai Dharmender S., Method and apparatus to determine user identity and limit access to a communications network.
  87. Stephen J. Purpura, Method and system for authentication and single sign on using cryptographically assured cookies in a distributed computer environment.
  88. Hanif Mohammad ; Vierling Michael ; Yanagihara Kazuhisa, Method and system for enabling a file server to service multiple networks of the same network protocol family by invok.
  89. Davidson Thomas J. (Austin TX) Kelley Michael T. (Austin TX), Method and system for implementing remote procedure calls in a distributed computer system.
  90. Want Roy (Mountain View CA) Adams Norman I. (Sunnyvale CA) Goldstein Richard J. (San Francisco CA) Schilit William N. (Palo Alto CA) Tso Michael M. (Beaverton OR), Method and system for maintaining processing continuity to mobile computers in a wireless network.
  91. Blakley ; III George R. (Austin TX) Hickerson L. Brooks (Austin TX) Milman Ivan M. (Austin TX) Gittins Robert S. (Woodland Park CO) Scheer Douglas B. (Boynton Beach FL) Wilson John H. (Austin TX), Method and system for providing a user access to multiple secured subsystems.
  92. Medvinsky,Alexander, Method and system for providing client privacy when requesting content from a public server.
  93. Lawlor Matthew P. (Washington DC) Carmody Timothy E. (McLean VA), Method and system for remote delivery of retail banking services.
  94. Ju, Paul Pay-Lun; Jan, Seaway, Method for communicating audio data in a packet switched network.
  95. Seitz Gregory W. (San Jose CA) Findley Sean J. (Gilroy CA) Beisel Philipp W. (Sunnyvale CA), Method for connecting a mobile computer to a computer network by using an address server.
  96. Korenshtein Roni (Los Gatos CA), Method for controlling access to a computer resource based on a timing policy.
  97. Schull Jonathan (Haverford PA), Method for encouraging purchase of executable and non-executable software.
  98. Obermanns Sebastian (Munich DEX) Schoonhoven Richard (Olching DEX), Method for maintaining virtual connections given an at least partial outage of connecting paths.
  99. Serlet Bertrand (Palo Alto CA) Boynton Lee (Palo Alto CA) Tevanian Avadis (Mountain View CA), Method for providing automatic and dynamic translation of object oriented programming language-based message passing int.
  100. Lin Jyh-Han ; Leung Wu-Hon Francis, Method for providing seamless communication across bearers in a wireless communication system.
  101. Shambroom W. David, Method for providing secure remote command execution over an insecure computer network.
  102. Ito Tsutomu (Kanagawa JPX) Hirosawa Toshio (Machida JPX) Ueoka Atsushi (Ome JPX) Kokunishi Motohide (Hachioji JPX) Yamagishi Tadashi (Yokohama JPX) Nakatsu Kouichi (Hadano JPX), Method of assisting server access by use of user authentication information held in one of servers and a method of assis.
  103. Sasmazel, Levent M D; Schneider, David H., Method of using an electronic ticket and distributed server computer architecture for the same.
  104. Machin Richard C. ; Hyder Jameel, Method, system, and computer program product for creating a raw data channel form an integrating component to a series of kernel mode filters.
  105. Derby Jeffrey H. (Chapel Hill NC) Doeringer Willibald A. (Langnau CHX) Dykeman Harold D. (Rueschlikon NC CHX) Li Liang (Chapel Hill NC) Sandick Haldon J. (Durham NC) Vu Ken V. (Cary NC), Methods and apparatus for interconnecting local area networks with wide area backbone networks.
  106. Schmidt Walter E. (604 W. 115th St. ; Apt. B New York NY 10025), Methods and apparatus for the protection and control of computer programs.
  107. Brabson, Roy Frank; Huynh, Lap Thiet, Methods, systems and computer program products for kernel based transaction processing.
  108. Inoue Atsushi,JPX ; Ishiyama Masahiro,JPX ; Fukumoto Atsushi,JPX ; Tsuda Yoshiyuki,JPX ; Shimbo Atsushi,JPX ; Okamoto Toshio,JPX, Mobile computer and method of packet encryption and authentication in mobile computing based on security policy of visited network.
  109. Inoue Atsushi,JPX ; Ishiyama Masahiro,JPX ; Fukumoto Atsushi,JPX ; Tsuda Yoshiyuki,JPX ; Shimbo Atsushi,JPX ; Okamoto Toshio,JPX, Mobile computing scheme using encryption and authentication processing based on mobile computer location and network operating policy.
  110. Shuen Pauline (Palo Alto CA), Mobile networking method and apparatus.
  111. Spaur Charles W. ; Braitberg Michael F. ; Kennedy Patrick J. ; Hatcher Lester B., Mobile portable wireless communication system.
  112. Baker Murray C. (Toronto NY CAX) Bhattacharya Partha P. (Briarcliff Manor NY) Chen Jeane S.-C. (Ossining NY) Cheung Roger Y. M. (Scarborough NY CAX) Krishna Arvind (Briarcliff Manor NY) Reissner Pete, Mobility enabling access point architecture for wireless attachment to source routing networks.
  113. Nessett Danny M. ; Sherer William Paul, Multilayer firewall system.
  114. Perkins Charles E. (Peekskill NY), Network address management for a wired network supporting wireless communication to a plurality of mobile users.
  115. Perlman Stephen G. (721 Tiana La. Mountain View CA 94041), Network architecture to support multiple site real-time video games.
  116. Miner Richard A. (Cambridge MA) Warner William J. (Weston MA) Lovell Anthony M. (Somerville MA) Shienbrood Eric R. (Concord MA) Gabryelski Keith (Cambridge MA) Arnold Kenneth C. R. C. (Lexington MA) , Network based knowledgeable assistant.
  117. Pitts, William Michael, Network intermediate node cache serving as proxy to client node to request missing data from server.
  118. Sharma Dushyant, Network transport driver interfacing.
  119. Kempf James (Mountain View CA) Powell Michael L. (Palo Alto CA), Non-supervisor mode cross address space dynamic linking.
  120. Pettus Christopher E. (San Francisco CA), Object-oriented network protocol configuration system utilizing a dynamically configurable protocol stack.
  121. Pettus Christopher E. (San Francisco CA), Object-oriented networking system with dynamically configurable communication links.
  122. Goldsmith Amy M. (Los Gatos CA) Goldsmith David B. (Los Gatos CA) Pettus Christopher E. (San Francisco CA), Object-oriented remote procedure call networking system.
  123. Katou Hiromi (Atsugi JPX) Kobayahsi Hirokazu (Saitama JPX), Packet data generator.
  124. Kuthyar Ashok K. ; Ramamurthy Ram S. ; Roy Radhika R., Packet mode multimedia conferencing services over an ISDN wide area network.
  125. Inoue Atsushi,JPX ; Ishiyama Masahiro,JPX ; Fukumoto Atsushi,JPX ; Tsuda Yoshiyuki,JPX ; Shimbo Atsushi,JPX ; Okamoto Toshio,JPX, Packet processing device and mobile computer with reduced packet processing overhead.
  126. Garrabrant Gary W. (Bellevue WA) Cho Jay C. (Seattle WA) Savarese Joseph T. (Snohomish County WA), Packet radio communication system protocol.
  127. Giancarlo Charles H. (Montclair NJ), Packet switching network.
  128. Choudhury Gagan Lal ; Kshirsagar Madhukar Moreshwar ; Veeraraghavan Malathi, Parallel connection control.
  129. Pierce Paul R. (Portland OR), Parallel processing system virtual connection method and apparatus with protection and flow control.
  130. Hagi Kazuo (Tokyo JPX), Protection switching system having impedance matching circuits.
  131. Renouard Julia J. ; Piercy Alan ; Heckt Steve ; Savarese Joe, Providing reliable communication over an unreliable transport layer in a hand-held device using a persistent session.
  132. Coleman Arthur Bernard ; Truong Linh Tien ; Grau ; Jr. Juan, Providing roaming capability for mobile computers in a standard network.
  133. Alden Kenneth F. ; Lichtenberg Mitchell P. ; Wobber Edward P., Pseudo network adapter for frame capture, encapsulation and encryption.
  134. Slavin Keith R., Public key cryptographic system having nested security levels.
  135. Zheng, Qin; Willis, Steven R.; Kastenholz, Frank; Crawley, Eric, Quality of service facility in a device for performing IP forwarding and ATM switching.
  136. Mousseau Gary P. (Waterloo CAX) Lazaridis Mihal (Waterloo CAX) Little Herb A. (Waterloo CAX) Barnstijn Michael A. (Waterloo CAX), Remote control of gateway functions in a wireless data communication network.
  137. Acosta Edward ; Kao Frank, Remote digital image viewing system and method.
  138. Hall Hans,SEX ; Willehadson Stefan,SEX, Remote procedure calls using short message service.
  139. Natarajan Kadathur S. (Millwood NY), Robust scheduling mechanm for efficient band-width usage in muliticell wireless local networks.
  140. Sturniolo Emil A. ; Ciotti ; Jr. Frank D. ; Seshadri Krishna P., Seamless roaming among multiple networks.
  141. Sturniolo Emil A. ; Clotti ; Jr. Frank D. ; Seshadri Krishna P., Seamless roaming among multiple networks.
  142. Sturniolo Emil A. ; Ciotti ; Jr. Frank D. ; Seshadri Krishna P., Seamless roaming among multiple networks including seamless transitioning between multiple devices.
  143. Beall Christopher W. ; Motycka John D. ; Pendleton Samuel S. ; Terpening Brooke E. ; Appelbaum Matthew A. ; Neal Michael R., Search engine for remote access to database management systems.
  144. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for Web based data management.
  145. Trieger Andrew W., Secure session tracking method and system for client-server environment.
  146. Elgamal Taher (Palo Alto CA) Hickman Kipp E. B. (Los Altos CA), Secure socket layer application program apparatus and method.
  147. Ananda Mohan (15910 Ventura Blvd. ; Suite 800 Encino CA 91436), Secure software rental system using continuous asynchronous password verification.
  148. Wood, David L.; Pratt, Thomas; Dilger, Michael B.; Norton, Derk; Nadiadi, Yunas, Security architecture with environment sensitive credential sufficiency evaluation.
  149. He Jingsha ; Hall Randle D., Security system and method for network element access.
  150. Parsons ; Jr. John E. ; Graziadio Bradley J. ; Momoh Oshoma, Server operating system for supporting multiple client-server sessions and dynamic reconnection of users to previous sessions using different computers.
  151. Perkins Charles E. (Ossining NY) Rekhter Jacob Y. (Putnam Valley NY), Shortcut network layer routing for mobile hosts.
  152. Matias, Yossi; Mayer, Alain Jules; Silberschatz, Abraham, Simplified secure shared key establishment and data delivery protocols for electronic commerce.
  153. Mandelbaum Richard (Manalapan NJ) Sherman Stephen A. (Hackettstown NJ) Wetherington Diane R. (Bernardsville NJ), Smartcard adapted for a plurality of service providers and for remote installation of same.
  154. Nakae, Masayuki, System and method for distributing digital works, apparatus and method for reproducing digital works, and computer program product.
  155. Chawla, Rajeev; Bautista, Fel; Framba, Marco; Talla, Venky; Gupta, Rajdeep, System and method for enabling single sign-on for networked applications.
  156. Riggins Mark D. ; Bailes R. Stanley ; Bui Hong O. ; Cowan David I. ; Mendez Daniel I. ; Ng Mason ; Quinlan Sean Michael ; Wagle Prasad ; Ying Christine C. ; Zuleeg Christopher R. ; Aptekar-Strober Jo, System and method for globally accessing computer services.
  157. Lederer Jeffrey H. (Pittsburgh PA) Connell David J. (Coraopolis PA) Pagano Patrick V. (Pittsburgh PA), System and method for multiplexing data transmissions.
  158. Gosling James A. (Woodside CA), System and method for pre-verification of stack usage in bytecode program loops.
  159. Pepe David Mathew (Middletown NJ) Blitzer Lisa B. (Manalapan NJ) Brockman James Joseph (Perrineville NJ) Cruz William (Eatontown NJ) Hakim Dwight Omar (Matawan NJ) Hovey Richard Reid (Somerville NJ) , System and method for providing protocol translation and filtering to access the world wide web from wireless or low-ban.
  160. Alexander Dorfman ; Jeffrey Wayne Pence, System and method for providing temporary remote access to a computer.
  161. Freund Gregor, System and methodology for managing internet access on a per application basis for client computers connected to the int.
  162. Barber Jon H. (Santa Barbara CA) Woodward Ronald A. (Boulder CO) Burkley Richard M. (Boulder CO) Rehme Erwin L. (Longmont CO) Jackson Matthew W. (Boulder CO) Young Douglas M. (Boulder CO), System for controlling the number of concurrent copies of a program in a network based on the number of available licens.
  163. Dawson William P. (Murray UT) Schiller Jay B. (Boulder CO) Schmelzer Richard A. (Boulder CO) Zigmond Daniel J. (Boulder CO), System for distributing video/audio files from central location to a plurality of cable headends.
  164. Brown Gary S., System for remote pass-phase authentication.
  165. Aiken, Jr.,John Andrew; Christensen,Alfred Bundgaard; Devine,Wesley McMillan; Herr,David Anthony; McClintock,Mark W., System having a single IP address associated with communication protocol stacks in a cluster of processing systems.
  166. Shields Ian Beaumont, System incorporating program for intercepting and interpreting or altering commands for generating I/O activity for ena.
  167. Kapoor Sandhya (Austin TX) Varadan Kumar S. (Austin TX) Wei Yi-Hsiu (Austin TX), Transparent local RPC optimization.
  168. Kralowetz Joseph D. ; Ortega Douglas F., Transparent support of protocol and data compression features for data communication.
  169. Miller John A. (Wilmette IL) Cleven David R. (Algonquin IL) Wall Robert J. (Highland Park IL), User specific intelligent interface which intercepts and either replaces or passes commands to a data identity and the f.
  170. Morris Michael D. (Cedar Rapids IA) Zumbach Lyle L. (Cedar Rapids IA), Versatile RF data capture system.
  171. Morris Michael D. (Cedar Rapids IA) Zumbach Lyle L. (Cedar Rapids IA), Versatile RF data capture system.
  172. Baldwin John H. (Morristown NJ) Chu Helen (New York NY) Doshi Bharat T. (Holmdel NJ) Dravida Subrahmanyam (Somerset NJ) Nanda Sanjiv (Plainsboro NJ) Treventi Philip A. (Murray Hill NJ), Virtual circuit management in cellular telecommunications.
  173. Hall ; Jr. George E. ; Kari John D., Virtual client to gateway connection over multiple physical connections.
  174. Dowling, Eric Morgan; Anastasi, Mark Nicholas, Virtual connection of a remote unit to a server.
  175. Garner William B. ; Tisdale William R., Virtual network configuration and management system for satellite communication system.
  176. Paulsen Gaige B. ; Walker Amanda, Virtual private network system and method.
  177. Narisi Anthony ; Kain Michael T. ; Salamon Gary ; Jennion Susan ; Coyne Lois B., Virtual transport layer interface and messaging subsystem for high-speed communications between heterogeneous computer systems.
  178. Ji Shuang (Foster City CA) Chen Eva (Cupertino CA), Virus detection and removal apparatus for computer networks.
  179. Harrison Colin George ; Jaepel Dieter,CHX, Wide-area wireless lan access.
  180. Agrawal Prathima ; Cravatts Mark Robert ; Trotter John Andrew ; Srivastava Mani Bhushan, Wireless adapter architecture for mobile computing.
  181. Messenger Steven (Scarborough CAX), Wireless coupling of devices to wired network.
  182. Haas Zygmunt (Holmdel NJ), Wireless data communications system for detecting a disabled condition and simulating a functioning mode in response to.
  183. Edward Acosta, Wireless network system and method.
  184. Alfano Nicholas P.,CAX ; Wagner Kevin R. ; Upp Steve ; Lin Jyh-Han ; Sivakumaran Sreedhar, Wireless protocol method and apparatus supporting transaction requests with variable length responses.
  185. Cowan Paul A., Wireless software upgrades with version control.

이 특허를 인용한 특허 (161)

  1. Raleigh, Gregory G.; Lavine, James, Adapting network policies based on device service processor configuration.
  2. Raleigh, Gregory G.; Rightmyer, Rob; Kudelin, Vladislav, Adaptive ambient services.
  3. Taylor, John Louis; Canosa, John Thomas, Adaptive device-initiated polling.
  4. Taylor, John Louis; Canosa, John Thomas, Adaptive device-initiated polling.
  5. Taylor, John Louis; Canosa, John Thomas, Adaptive device-initiated polling.
  6. Duursma, Martin; Panasyuk, Anatoliy; Ciraldo, Robert; Ungerman, Anthony; Pedersen, Bradley; Davis, III, Tom; Bloomfield, Marc, Apparatus and method for determining a program neighborhood for a client node in a client-server network.
  7. Lang, Zhongmin; Barton, Gary, Application with multiple operation modes.
  8. Raleigh, Gregory G.; Lavine, James, Automated credential porting for mobile devices.
  9. Borzycki, Andrew; Deva, Mallikharjuna Reddy; Bissett, Nick; Roychoudhry, Anil; Duursma, Martin, Automated meeting room.
  10. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Automatically reconnecting a client across reliable and persistent communication sessions.
  11. Bridge, Henry; Goodger, Ben; Murphy, Glen; Jitkoff, J. Nicholas, Background auto-submit of login credentials.
  12. Bridge, Henry; Goodger, Ben; Murphy, Glen; Jitkoff, John Nicholas, Background auto-submit of login credentials.
  13. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza; Sabin, Michael J., Communications device with secure data path processing agents.
  14. Barton, Gary; Lang, Zhongmin; Desai, Nitin; Walker, James Robert, Configuring and providing profiles that manage execution of mobile applications.
  15. Barton, Gary; Lang, Zhongmin; Desai, Nitin; Walker, James Robert, Configuring and providing profiles that manage execution of mobile applications.
  16. Barton, Gary; Lang, Zhongmin; Desai, Nitin; Walker, James, Conjuring and providing profiles that manage execution of mobile applications.
  17. Wentker, Dave; Wong, Erick; Shenker, Gavin; Deibert, Doug, Contactless transaction.
  18. Qureshi, Waheed; McGinty, John M.; Andre, Olivier; Abdullah, Shafaq, Controlling mobile device access to enterprise resources.
  19. Barton, Gary; Lang, Zhongmin; Desai, Nitin; Walker, James Robert, Controlling mobile device access to secure data.
  20. Barton, Gary; Lang, Zhongmin; Desai, Nitin; Walker, James Robert, Controlling mobile device access to secure data.
  21. Barton, Gary; Lang, Zhongmin; Desai, Nitin; Walker, James Robert, Controlling mobile device access to secure data.
  22. Raleigh, Gregory G., Device assisted services install.
  23. Raleigh, Gregory G., Device group partitions and settlement platform.
  24. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Device-assisted services for protecting network capacity.
  25. Raleigh, Gregory G.; Lavine, James; Green, Jeffrey, End user device that secures an association of application to service policy with an application certificate check.
  26. Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey; Lavine, James; Carter, III, Russell Bertrand, Enhanced curfew and protection associated with a device group.
  27. Raleigh, Gregory G., Enhanced roaming services and converged carrier networks with device assisted services and a proxy.
  28. Raleigh, Gregory G.; Raissinia, Alireza; Green, Jeffrey, Enterprise access control and accounting allocation for access networks.
  29. Borzycki, Andrew; Deva, Mallikharjuna Reddy; Gajendar, Uday Nandigam; Roychoudhry, Anil, Enterprise application store for an orchestration framework for connected devices.
  30. Borzycki, Andrew; Deva, Mallikharjuna Reddy; Gajendar, Uday Nandigam; Roychoudhry, Anil, Enterprise application store for an orchestration framework for connected devices.
  31. Zawacki, Jennifer Greenwood; Perrin, Steven Richard; Rutledge, James Stephen; Roper, Matthew; Davis, Mark Charles; Kelso, Scott Edwards, Establishing a remote desktop.
  32. Shedrinsky, Felix, Establishing a virtual tunnel between two computer programs.
  33. Shedrinsky, Felix, Establishing a virtual tunnel between two computer programs.
  34. Shedrinsky, Felix, Establishing a virtual tunnel between two computers.
  35. Qureshi, Waheed; McGinty, John M., Gateway for controlling mobile device access to enterprise resources.
  36. Raleigh, Gregory G., Hierarchical service policies for creating service usage data records for a wireless end-user device.
  37. Taylor, John L.; Rochte, Timothy A; Bhageshpur, Kiran, Managing configurations of distributed devices.
  38. Taylor, John L.; Rochte, Timothy A; Bhageshpur, Kiran; Hart, David Patrick, Managing configurations of distributed devices.
  39. Taylor, John Louis; Rochte, Timothy A.; Bhageshpur, Kiran; Hart, David Patrick, Managing configurations of distributed devices.
  40. Taylor, John Louis; Rochte, Timothy A.; Bhageshpur, Kiran; Hart, David Patrick, Managing configurations of distributed devices.
  41. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K. R., Bharath; Kumar, Anil, Method and device for performing caching of dynamically generated objects in a data communication network.
  42. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K.R., Bharath; Kumar, Anil, Method and device for performing caching of dynamically generated objects in a data communication network.
  43. Khemani, Prakash; Sundarrajan, Prabakar; Kumar, Lakshmi; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravanakumar, Method and device for performing integrated caching in a data communication network.
  44. Agarwal, Preeti; Bhagwat, Rohit, Method and system for protection of messages in an electronic messaging system.
  45. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for routing packets from a gateway to an endpoint.
  46. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for routing packets from an endpoint to a gateway.
  47. Rao, Goutham; Rodriguez, Robert; Brueggemann, Eric, Method and systems for routing packets from an endpoint to a gateway.
  48. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for securing remote access to private networks.
  49. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for securing remote access to private networks.
  50. Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey; Lavine, James; Carter, III, Russell Bertrand; James, Justin; Nguyen, Laurent An Minh, Method for child wireless device activation to subscriber account of a master wireless device.
  51. Rao, Goutham P.; Brueggemann, Eric R.; Rodriguez, Robert A., Method for maintaining transaction integrity across multiple remote access servers.
  52. Raleigh, Gregory G., Method for operating a wireless end-user device mobile payment agent.
  53. Kramer, Andre, Methods and systems for providing access to an application.
  54. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Methods and systems for securing access to private networks using encryption and authentication technology built in to peripheral devices.
  55. Raleigh, Gregory G.; Lavine, James; Carter, III, Russell Bertrand, Mobile device and service management.
  56. Desai, Nitin, Mobile device locking with context.
  57. Shenker, Gavin; Wentker, David; Deibert, Douglas; Wong, Erick, Mobile device with disabling feature.
  58. Shenker, Gavin; Wentker, David; Deibert, Douglas; Wong, Erick, Mobile device with disabling feature.
  59. Deibert, Doug; Wong, Erick; Shenker, Gavin; Wentker, David, Mobile phone payment with disabling feature.
  60. Qureshi, Waheed; DeBenning, Thomas H.; Andre, Olivier; Abdullah, Shafaq, Modifying pre-existing mobile applications to implement enterprise security policies.
  61. Franke, Michael; McDonald, Michael, Network protocol proxy.
  62. Franke, Michael; McDonald, Michael, Network protocol proxy.
  63. Carrico, Sandra Lynn; Hebrais, Philippe, Network security device and method.
  64. Carrico, Sandra Lynn; Hebrais, Philippe, Network security device and method.
  65. Barton, Gary; Walker, James Robert; Desai, Nitin; Lang, Zhongmin, Policy based application management.
  66. Barton, Gary; Walker, James Robert; Desai, Nitin; Lang, Zhongmin, Policy-based application management.
  67. Barton, Gary; Walker, James Robert; Desai, Nitin; Lang, Zhongmin, Policy-based application management.
  68. Barton, Gary; Walker, James Robert; Desai, Nitin; Lang, Zhongmin, Policy-based application management.
  69. Barton, Gary; Walker, James Robert; Desai, Nitin; Lang, Zhongmin, Policy-based application management.
  70. Barton, Gary; Walker, James Robert; Desai, Nitin; Lang, Zhongmin, Policy-based application management.
  71. Barton, Gary; Walker, James Robert; Desai, Nitin; Lang, Zhongmin, Policy-based application management.
  72. Agarwal, Preeti; Bhagwat, Rohit, Prioritizing the scanning of messages using the reputation of the message destinations.
  73. Qureshi, Waheed, Providing a managed browser.
  74. Qureshi, Waheed, Providing a managed browser.
  75. Qureshi, Waheed, Providing a managed browser.
  76. Qureshi, Waheed, Providing a managed browser.
  77. Qureshi, Waheed, Providing a managed browser.
  78. Qureshi, Waheed, Providing a managed browser.
  79. Qureshi, Waheed, Providing a managed browser.
  80. Qureshi, Waheed, Providing a managed browser.
  81. Qureshi, Waheed, Providing a managed browser.
  82. Qureshi, Waheed, Providing a managed browser.
  83. Batson, Kevin; Hayton, Richard, Providing an enterprise application store.
  84. Batson, Kevin; Hayton, Richard, Providing an enterprise application store.
  85. Batson, Kevin; Hayton, Richard, Providing an enterprise application store.
  86. Batson, Kevin; Hayton, Richard, Providing an enterprise application store.
  87. Qureshi, Waheed, Providing mobile device management functionalities.
  88. Qureshi, Waheed, Providing mobile device management functionalities.
  89. Qureshi, Waheed, Providing mobile device management functionalities.
  90. Qureshi, Waheed, Providing mobile device management functionalities for a managed browser.
  91. Qureshi, Waheed; Andre, Olivier; Abdullah, Shafaq, Providing secure mobile device access to enterprise resources using application tunnels.
  92. Barton, Gary; Lang, Zhongmin; Desai, Nitin; Walker, James Robert, Providing virtualized private network tunnels.
  93. Barton, Gary; Lang, Zhongmin; Desai, Nitin; Walker, James Robert, Providing virtualized private network tunnels.
  94. Barton, Gary; Lang, Zhongmin; Desai, Nitin; Walker, James Robert, Providing virtualized private network tunnels.
  95. Barton, Gary; Lang, Zhongmin; Desai, Nitin; Walker, James Robert, Providing virtualized private network tunnels.
  96. Barton, Gary; Lang, Zhongmin; Desai, Nitin; Walker, James Robert, Providing virtualized private network tunnels.
  97. Raleigh, Gregory G.; Rightmyer, Rob; Kudelin, Vladislav, Proxy system and method for adaptive ambient services.
  98. Raleigh, Gregory G., Quality of service for device assisted services.
  99. Hansen, James R., Reporting the state of an apparatus to a remote computer.
  100. Hansen, James R., Reporting the state of an apparatus to a remote computer.
  101. Hansen, James R., Retrieving data from a server.
  102. Hansen, James R., Retrieving data from a server.
  103. Hansen, James R., Retrieving data from a server.
  104. Qureshi, Waheed; McGinty, John M., Rules based detection and correction of problems on mobile devices of enterprise users.
  105. Hansen, James R., Scripting of SOAP commands.
  106. Hansen, James R., Scripting of soap commands.
  107. Ashok, Rohith Kottamangalam; Jemiolo, Daniel Everett; Kaplinger, Todd Eric; Shook, Aaron Kyle, Secure access to a virtual machine.
  108. Ashok, Rohith Kottamangalam; Jemiolo, Daniel Everett; Kaplinger, Todd Eric; Shook, Aaron Kyle, Secure access to a virtual machine.
  109. Qureshi, Waheed; McGinty, John M.; Andre, Olivier; Abdullah, Shafaq; DeBenning, Thomas H.; Datoo, Ahmed; Roach, Kelly Brian, Secure container for protecting enterprise data on a mobile device.
  110. Qureshi, Waheed; DeBenning, Thomas H.; Datoo, Ahmed; Andre, Olivier; Abdullah, Shafaq, Secure execution of enterprise applications on mobile devices.
  111. Qureshi, Waheed; DeBenning, Thomas H.; Datoo, Ahmed; Andre, Olivier; Abdullah, Shafaq, Secure execution of enterprise applications on mobile devices.
  112. Qureshi, Waheed; DeBenning, Thomas H.; Datoo, Ahmed; Andre, Olivier; Abdullah, Shafaq; McGinty, John M.; Roach, Kelly Brian, Secure execution of enterprise applications on mobile devices.
  113. Raleigh, Gregory G., Security techniques for device assisted services.
  114. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James, Security, fraud detection, and fraud mitigation in device-assisted services systems.
  115. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza; James, Justin; Green, Jeffrey, Service design center for device assisted services.
  116. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Service selection set publishing to device agent with on-device service selection.
  117. Borzycki, Andrew; Deva, Mallikharjuna Reddy; Gajendar, Uday Nandigam; Roychoudhry, Anil, Single sign-on access in an orchestration framework for connected devices.
  118. Hart, David P.; Taylor, John, System and method for dynamically grouping devices based on present device conditions.
  119. Hart, David Patrick; Taylor, John Louis, System and method for dynamically grouping devices based on present device conditions.
  120. Hart, David Patrick; Taylor, John Louis, System and method for dynamically grouping devices based on present device conditions.
  121. Hart, David Patrick; Taylor, John Louis, System and method for dynamically grouping devices based on present device conditions.
  122. Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
  123. Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
  124. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K R, Bharath; Kumar, Anil, System and method for performing entity tag and cache control of a dynamically generated object not identified as cacheable in a network.
  125. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K R, Bharath; Kumar, Anil, System and method for performing entity tag and cache control of a dynamically generated object not identified as cacheable in a network.
  126. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan KR, Bharath; Kumar, Anil, System and method for performing flash caching of dynamically generated objects in a data communication network.
  127. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; K.R., Bharat Bhushan; Kumar, Anil, System and method for performing flash caching of dynamically generated objects in a data communication network.
  128. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bushan K. R., Bharath; Kumar, Anil, System and method for performing flash crowd caching of dynamically generated objects in a data communication network.
  129. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan KR, Bharath; Kumar, Anil, System and method for performing granular invalidation of cached dynamically generated objects in a data communication network.
  130. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, System and method for wireless network offloading.
  131. Konanka, Dzmitry; Liahuski, Andrei, System and methodology providing secure workspace environment.
  132. Reza, Areef, System and methods for resilient media streaming.
  133. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for adjusting the maximum transmission unit by an intermediary device.
  134. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for adjusting the maximum transmission unit for encrypted communications.
  135. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for automatic installation and execution of a client-side acceleration program.
  136. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for client-side application-aware prioritization of network communications.
  137. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for communicating a lossy protocol via a lossless protocol.
  138. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for communicating a lossy protocol via a lossless protocol.
  139. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements.
  140. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements.
  141. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for facilitating a peer to peer route via a gateway.
  142. Panasyuk,Anatoliy; Kramer,Andre; Pedersen,Bradley Jay; Stone,David Sean; Treder,Terry, Systems and methods for maintaining a session between a client and host service.
  143. Barton, Gary Lee; Feijoo, Ricardo Fernando, Systems and methods for managing printer settings in a networked computing environment.
  144. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for network disruption shielding techniques.
  145. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for providing a VPN solution.
  146. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for providing a VPN solution.
  147. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for providing client-side accelerated access to remote applications via TCP buffering.
  148. Sundarrajan, Prabakar; He, Junxiao; Nanjundaswamy, Shashi; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for providing client-side accelerated access to remote applications via TCP multiplexing.
  149. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil; Nanjundaswamy, Shashi, Systems and methods for providing client-side accelerated access to remote applications via TCP pooling.
  150. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil; Suganthi, Josephine, Systems and methods for providing client-side dynamic redirection to bypass an intermediary.
  151. Frost, Simon; Williams, David, Systems and methods for user login.
  152. Jagadish, Ashwin; Chauhan, Abhishek; Joshi, Rajesh; Annamalaisami, Saravana, Systems and methods for web logging of trace data in a multi-core system.
  153. Raleigh, Gregory G.; Lavine, James, Virtualized policy and charging system.
  154. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differential traffic control policy list applicable to one of several wireless modems.
  155. Raleigh, Gregory G.; Lavine, James; Green, Jeffrey; Raissinia, Alireza, Wireless end-user device with divided user space/kernel space traffic policy system.
  156. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with network traffic API to indicate unavailability of roaming wireless connection to background applications.
  157. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with wireless modem power state control policy for background applications.
  158. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless network service interfaces.
  159. Walker, James, Wrapping an application with field-programmable business logic.
  160. Walker, James; Lang, Zhongmin; Barton, Gary; Aravindakshan, Vipin, Wrapping unmanaged applications on a mobile device.
  161. Hansen, James R., XML scripting of SOAP commands.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로