$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Cryptographic currency user directory data and enhanced peer-verification ledger synthesis through multi-modal cryptographic key-address mapping

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06Q-020/36
  • G06Q-020/40
  • G06Q-020/22
  • H04L-009/32
출원번호 US-0262713 (2014-04-26)
등록번호 US-9830593 (2017-11-28)
발명자 / 주소
  • Myers, Michael
출원인 / 주소
  • SS8 NETWORKS, INC.
대리인 / 주소
    Raj Abhyanker, P.C.
인용정보 피인용 횟수 : 1  인용 특허 : 246

초록

Disclosed is a method and a system of cryptographic currency user directory data and enhanced peer-verification ledger synthesis through multi-modal cryptographic key-address mapping. The method determines that a propagation packet is a transaction of a cryptographic currency and extracts both an IP

대표청구항

1. A method, using a computer processor and a physical memory, comprising: determining that a propagation packet is a transaction of a cryptographic currency propagating across a network for integration into a peer-verification ledger based on identification within an application layer protocol of t

이 특허에 인용된 특허 (246)

  1. Raizen, Helen S.; Reiner, David Stephen; Pellowski, Robert J.; Sandstrom, Harold M.; Roberts, Harrison K., Adaptive optimization across information technology infrastructure.
  2. Ghannadian, Farzad; Fang, Li; Quinn, Michael J., Adaptive, flow-based network traffic measurement and monitoring system.
  3. Anchan, Kirankumar; Santhanam, Arvind V.; Bhaskaran, Hamsini, Apparatus and method for performing lawful intercept in group calls.
  4. Bantz, David F; Chefalas, Thomas E; Jalan, Srikant; Mastrianni, Steven J; Pickover, Clifford Alan, Apparatus and methods for activity-based management of computer systems.
  5. Guruswamy, Kowsik; Leung, Siu-Wang, Application-layer monitoring and profiling network traffic.
  6. Kracht, James E., Approaches for determining actual physical topology of network based on gathered configuration information representing true neighboring devices.
  7. Caceres,Maximiliano Gerardo; Richarte,Gerardo Gabriel; Friedman,Agustin Azubel; Quesada,Ricardo; Notarfrancesco,Luciano; Friederichs,Oliver; Burroni,Javier; Ajzenman,Gustavo; Becedillas,Gabriel; Leid, Automated computer system security compromise.
  8. Li Jim Y. ; Cobbs Archie L. ; Ozzello Paul D., Automatic configuration for internet access device.
  9. Wu Jeff C. (Ft. Collins CO), Automatic discovery of network elements.
  10. Kahn, Philippe; Kinsolving, Arthur; Rudraraju, Panduranga R; Bodmer, Brian, Automatic sharing and publication of multimedia from a mobile device.
  11. Chheda, Mahendra M.; Heidel, Shawn E.; Jaye, Robert B.; Brindley-Koonce, Justin K.; Brandwine, Eric Jason, Best practice analysis, third-party plug-ins.
  12. Cai, Yigang; Chen, Xu, Call control component employment of one or more criteria for internet protocol call selection for eavesdrop component monitoring.
  13. Krantz, Kristine Amber; Pan, Peiliang; Smith, Daniel Ernest, Chat preview.
  14. Matsumoto, Tatsuro; Iwayama, Noboru, Chat system and method for delivering additional information via another independent network.
  15. Grove, Michael; Grove, Deborah; Van der Veen, Larry; Strots, Alexei, Choice-based relationship system (CRS).
  16. Reiner, David Stephen; Graham, Stephen G.; Todd, Stephen, Classifying situations for system management.
  17. Gardenswartz Will H. ; Banker David W. ; Goidel Melissa B., Communicating with a computer based on an updated purchase behavior classification of a particular consumer.
  18. Sumiyo Okada JP; Masahiko Murakami JP; Yasuhide Matsumoto JP; Tatsuro Matsumoto JP; Kenichi Sasaki JP; Hidenobu Ito JP; Hitoshi Yamauchi JP, Communication management system for a chat system.
  19. Bondy,William M.; Jones,Wesley Stuart; Silverman,Shmuel; Wiatrak,Bruce Martin; Liss,Raymond M.; Moran,Timothy L.; Nodell,Howard; Hug,Robert Gerald, Communication network with a collection gateway and method for providing surveillance services.
  20. Li, Gordon; Chen, Sherman (Xuemin), Communication over bandwidth-constrained network.
  21. Van Horne Peter ; Olson Keith ; Miller Kevin, Communications network connection system and method.
  22. Hoile, Cefn R; Kings, Nicholas J; Davies, Nicholas J, Computer network.
  23. Cancel, David; Moores, Lauren S; Currea, Laura, Computer program product and method for estimating internet traffic.
  24. Takahashi,Toshinari, Computer virus generation detection apparatus and method.
  25. Jackson Jerry R., Computer-based visual data evaluation.
  26. Nguyen, Bill; Mallet, Vincent; Woods, Nicholas; Cheng, Jessica; Chokshi, Sandip; Ramanarayanan, Ganesh; Streich, Megan, Content sharing via multiple content distribution servers.
  27. Flewallen, Steven Adams; Johnson, David Nephi; Burch, Lloyd Leon; Fjeldsted, Benjamin Clark; Beus, David Kent; Sriram, Thiruvarangam Viswanathan, Control of communication ports of computing devices using policy-based decisions.
  28. Natarajan, Ramachandran; Patil, Suhas S., Control of security application in a LAN from outside the LAN.
  29. Sachse,Christopher; Lund,Timothy, Controlling data collection, manipulation and storage on a network with service assurance capabilities.
  30. Ogg,Craig L.; Chow,William W., Cryptographic module for secure processing of value-bearing items.
  31. Ogg,Craig L.; Chow,William W.; Venkat,Girish; Lingle,Piers C., Cryptographic module for secure processing of value-bearing items.
  32. Khan,Winston; Bowler,Ken; Hamilton,Ian, Data transfer system and method with secure mapping of local system access rights to global identities.
  33. Gailloux, Michael A.; Samson, Kenneth W.; Shah, Gautam M., Defined delays to support consistent tiered messaging performance.
  34. Gailloux, Michael A.; Samson, Kenneth W.; Shah, Gautam M., Defined delays to support consistent tiered messaging performance.
  35. Molen,Brett Thomas; Burns,Darrell Richard; Burns,Douglass Ervan; Draper,Nichol Fife; Ehlers,Richard L., Detection of multiple users of a network access node.
  36. Olding, Doug A.; Cope, Warren B., Determining a quality-of-service prior to registering a wireless device.
  37. Pfitzmann, Birgit M., Determining an applicable policy for an incoming message.
  38. Levy, Hanoch; Marshak, Marik, Determining client latencies over a network.
  39. Bassanio Law ; Shamim Shariffudin Pirzada ; Shaji Ravindra Nathan, Dial access stack architecture.
  40. Redlich, Ron M.; Nemzow, Martin A., Digital information infrastructure and method for security designated data and with granular data stores.
  41. Lindsay, Robert Taaffe; DiPersia, Blaise Andrew, Displaying demographic information of members discussing topics in a forum.
  42. Miller Steven P. (Newton MA) Lampson Butler W. (Cambridge MA), Distributed configuration profile for computing system.
  43. Gudjonsson, Gudjon M.; Emilsson, Kjartan Pierre, Distributed system to intelligently establish sessions between anonymous users over various networks.
  44. Tindal,Glen; Schenk,Jeffery A., Dynamic configuration of network devices to enable data transfers.
  45. Redlich, Ron M.; Nemzow, Martin A., Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor.
  46. Bishop, David A.; Hoover, Kelvin M., Enterprise management system.
  47. Bishop, David A.; Hoover, Kelvin M., Enterprise management system.
  48. Bishop,David A.; Hoover,Kelvin M., Enterprise management system.
  49. Ahuja, Vikas; Blomquist, Brian Charles; Briggs, Reeves Hoppe, Extensible dynamic performance instrumentation of pages.
  50. Adelstein, Frank N.; Powers, Judson; Joyce, Robert A.; Bronner, Derek, Extensible software tool for investigating peer-to-peer usage on a target device.
  51. Tanimoto, Yoshifumi, File server device arranged in a local area network and being communicable with an external server arranged in a wide area network.
  52. Mundy Joy A. ; McFadden Andrew T., Generation and execution of scripts for enabling cost-effective access to network resources.
  53. Murphy, Jr., Kevin J.; Amaral, John, High-availability network appliances and methods.
  54. Nelson Jamie ; Janze Leonard ; Ravichandran Kalpana ; Rangarajan Govindarajan, IP discovery apparatus and method.
  55. Curtis T. Combar ; Robert A. Pfister, Integrated proxy interface for web based telecommunications management tools.
  56. Barney Matthew F., Intelligent agent for identifying intellectual property infringement issues in computer network sites and method of operation thereof.
  57. Dark,Susan Pittman, Intelligent feedback loop process control system.
  58. Charles Glommen ; Blaise Barrelet, Internet website traffic flow analysis.
  59. Swaminathan, Kishore; Liongosari, Edy S.; Dempski, Kelly L.; Kurth, Scott, Knowledge management tool.
  60. Ryan,Ronald D.; Homayoun,Fereidoun, Lawful communication interception--intercepting communication associated information.
  61. Attanasio, Francesco, Lawful interception and data retention of messages.
  62. Saleem, Adnan; Gunn, Neil; Xin, Yong; Gill, Jagtar; Chubbs, Alvin, Lawful interception of real time packet data.
  63. Shen, Jennifer Iting; Shahine, Omar H.; Kafka, Steven D.; Telehowski, Jennie Park; Gillum, Eliot; Yang, Sara Liu, Leveraging communications to identify social network friends.
  64. Deninger, William; Ahuja, Ratinder Paul Singh; de la Iglesia, Erik, Locational tagging in a capture system.
  65. Sim-Tang, Siew Yong; Fraisl, Daniel J.; Hoeber, Anthony N., Management interface for a system that provides automated, real-time, continuous data protection.
  66. Moisand, Jerome Pascal; Onishi, Steven; Kokot, Mathias; DeRuijter, Denis Henk, Managing a network flow using application classification information and active signaling relay.
  67. Ianchici, Alexander; Cook, Robert Wendell; Roy, Cory Michael, Managing use of proxies to access restricted network locations.
  68. Pugh, Brian; Pecjak, Frank E., Measurements based on panel and census data.
  69. James E. Kracht, Mechanism for determining actual physical topology of network based on gathered configuration information representing true neighboring devices.
  70. Eiras, Jan Phillippe; Ripper, Martin, Message traffic interception system.
  71. Blumenau Trevor, Metering of internet content using a control.
  72. Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for a cryptographically-assisted commercial network system designed to facilitate and support exper.
  73. Suman Kumar Inala ; P Venkat Rangan, Method and apparatus for a site-sensitive interactive chat network.
  74. Knight Greg ; Nicholson Robert Bruce, Method and apparatus for analyzing a storage network based on incomplete information from multiple respective controllers.
  75. Franke, Hubertus; Baransky, Yurij Andrij; Pattnaik, Pratap Chandra, Method and apparatus for asset tracking of network attached devices.
  76. Fraser Alexander Gibson, Method and apparatus for automated provisioning and billing of communication services.
  77. Cohen,Ron; Snir,Yoram; Schnizlein,John, Method and apparatus for automatically establishing bi-directional differentiated services treatment of flows in a network.
  78. Himmel Maria Azua ; Berstis Viktors, Method and apparatus for controlling client access to documents.
  79. Chang Steve M. (Rancho Palos Verdes CA), Method and apparatus for controlling network and workstation access prior to workstation boot.
  80. Aggarwal Ajay (Somersworth NH) Scott Walter (Salem NH) Rustici Eric (Londonderry NH) Bucciero David (Nashua NH) Haskins Andrew (Lee NH) Matthews Wallace (Exeter NH), Method and apparatus for determining a communications path between two nodes in an Internet Protocol (IP) network.
  81. Hsu Juliana M.,CAX, Method and apparatus for discovery of databases in a client server network.
  82. Yu, Jay J.; Rodriguez, Jesse M.; Worley, Evan M., Method and apparatus for displaying data models and data-model instances.
  83. Yu, Jay J.; Rodriguez, Jesse M.; Worley, Evan M., Method and apparatus for displaying data models and data-model instances.
  84. Basche Todd, Method and apparatus for distributing over a network unsolicited information to a targeted audience.
  85. Barrick ; Jr. James G. ; Ge Guoqiang ; Zou Tong, Method and apparatus for evalutating service to a user over the internet.
  86. Mangipudi,Krishna; Basani,Vijay, Method and apparatus for implementing a service-level agreement.
  87. Amit Gupta ; Sriraman Venkataraman GB; Geoffrey Baehr, Method and apparatus for local advertising.
  88. Touboul, Shlomo, Method and apparatus for monitoring and controlling programs in a network.
  89. Fang,Zheng, Method and apparatus for monitoring voice conversations from customer premises equipment.
  90. Arad Naveh ; Itzhak Parnafes ; Shai Mohaban ; Steven M. Woo, Method and apparatus for policy-based management of quality of service treatments of network data traffic flows by integrating policies with application programs.
  91. Levy Daniel Richard, Method and apparatus for providing a web site having a home page that automatically adapts to user language and customs.
  92. Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olson, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  93. Sutou, Hiromi; Kontani, Tsutomu, Method and apparatus for remotely controlling a terminal by a control terminal and storing control history information at the terminal being remotely controlled.
  94. Franklin Matthew Keith ; Malkhi Dahlia, Method and apparatus for secure and auditable metering over a communications network.
  95. Barclay, Deborah Lewandowski; Benco, David S.; Mahajan, Sanjeev; McRoberts, Thomas Lee; Ruggerio, Raymond Leroy, Method and apparatus for surveillance of voice over internet protocol communications.
  96. Davis Owen ; Jain Vidyut, Method and apparatus for tracking client interaction with a network resource and creating client profiles and resource d.
  97. Wasserblat, Moshe; Kristjansson, Gudmundur; Fraser, Cromwell; Moretzky, Zvika; Schonhage, Bastiaan; Morgenstern, Yaron; Ashkenazi, Tzach; Daya, Ezra; Pereg, Oren, Method and apparatus for transaction verification.
  98. Kronander, Jonas; Selén, Yngve, Method and apparatus for transmitting available radio access possibilities in a communications area.
  99. Kajekar, Preetham; Sathyanarayana, Krishna, Method and system for automating collateral configuration in a network.
  100. Bhrara, Raminder Singh; Watkins, Philip Andrew, Method and system for determining application availability.
  101. Mishra, Sanjeev K.; Ghannadian, Farzad; Fang, Li, Method and system for dynamically capturing flow traffic data.
  102. Daniel M. Gruen ; Mark A. Sheldon ; Shivakumar Vaithaynathan, Method and system for informing users of subjects of discussion in on-line chats.
  103. Wheeler, Maxon R.; Camp, II, William N.; Mamitsuka, Lien T.; Mitra, Christopher A.; Putterman, Scott I.; Wei, Kai, Method and system for intermediating content provider website and mobile device.
  104. Reith,Lothar, Method and system for lawful interception of packet switched network services.
  105. Bayliss, David, Method and system for linking and delinking data records.
  106. Houri,Cyril, Method and system for locating geographical locations of online users.
  107. Garrow,Gary R.; Newton, III,Charles P.; Weir,Patrick E.; West, II,David P.; Wetzer,Michael; Ashby,Gary, Method and system for managing configuration of mechanical equipment.
  108. Duimovich,Frank; Godin,Benoit; Col찼sante,Frederico; Hashim,Mohamed, Method and system for managing performance of data transfers for a data access system.
  109. Fowler, John J.; Cullen, Gerard L., Method and system for monitoring computer networks and equipment.
  110. Lakhani, Shailesh; Chan, Jacky, Method and system for multimedia messaging service (MMS) rating and billing.
  111. Sankaran, Ganesh Chennimalai; Venkat, Balaji, Method and system for network management using wire tapping.
  112. Wasser, Barry, Method and system for predicting system performance and capacity using software module performance statistics.
  113. Greaves, Jon D.; Seminaro, Michael D., Method and system for relocating and using enterprise management tools in a service provider model.
  114. Boysko, Glenn J.; Hurwood, William; Li, Benjamin Z.; Warikoo, Abhimanyu, Method and system for security and user account integration by reporting systems with remote repositories.
  115. Brown, Martin; Griffith, Tim Peter; Knibb, David Evans; Heritage, Ian Derek, Method and system for simulating latency between layers of multi-tier applications.
  116. Karstens,Rich; Robertson,Ryan, Method and system for single-step enablement of telephony functionality for a portable computer system.
  117. Kouznetsov, Victor, Method and system for updating anti-intrusion software.
  118. Cope,Warren B.; Gailliaert,Ferry J., Method and system for wiretapping of packet-based communications.
  119. Cheng, Limin; Luo, Qibu; Li, Mu, Method and system of processing cookies across domains.
  120. Cohen,Morgan, Method and system to connect and match users in an electronic dating service.
  121. Estrada,Hugo Alexander; Kumhyr,David Bruce; Virun,William E., Method and system using ARP cache data to enhance accuracy of asset inventories.
  122. Houri, Cyril, Method and systems for locating geographical locations of online users.
  123. Kreusch, Norbert; Pfähler, Wolfgang; Stifter, Helmut, Method and telecommunications system for monitoring a data flow in a data network.
  124. Mark Henry Hansen ; Wim Sweldens, Method for characterizing and visualizing patterns of usage of a web site by network users.
  125. Wagh, Sachin Ashok; Gupta, Vikas, Method for determining service demands in a network load balanced scenario.
  126. Ramakrishnan, Karthik; Collett, Ian Gordon; Rahim, Rubens, Method for implementing an internet protocol (IP) charging and rating middleware platform and gateway system.
  127. Skoczkowski, Lucas; Rahim, Rubens, Method for implementing an open charging (OC) middleware platform and gateway system.
  128. Liu, Enhui, Method for implementing resources reservation in a proxy-requested mode in next generation network.
  129. Fernández Gutierrez, Alvaro, Method for lawfully intercepting communication IP packets exchanged between terminals.
  130. Fernández Gutierrez, Alvaro, Method for lawfully intercepting communication IP packets exchanged between terminals.
  131. Bizzarri, Simone; Goria, Paolo, Method for simulating a communication network that considers quality of service.
  132. Hao,Ming C.; Dayal,Umeshwar; Cotting,Daniel; Gross,Markus; Holenstein,Thomas; Ono,Brian; Karp,Alan, Method for visualizing graphical data sets having a non-uniform graphical density for display.
  133. Cadiou, Jean-François; Bonnamy, Jean-Michel; Hamchaoui, Isabelle; Chaplain, René, Method of configuring parameters for managing data packets of a data stream.
  134. Steven B. Levy, Method using an assigned dynamic IP address and automatically restoring the static IP address.
  135. Freedman, Ilan; Dolev, Yair; Falik, Talia; Pereg, Oren; Wasserblat, Moshe; Aharoni, Gili; Bar, Eytan; Shermister, Shai; Arussy, Lior; Meidav, Yifat, Method, apparatus and system for capturing and analyzing interaction based content.
  136. Leon, JP; Pion, Albert L.; Simon, Elizabeth A., Method, apparatus, and code for maintaining secure postage data.
  137. Rabe,Kenneth J, Method, apparatus, and computer readable medium for providing network storage assignments.
  138. Liu, Tingyong; Liu, Guoqing; Zhang, Wenda, Method, device and system for network interception.
  139. Lam, Kathryn K.; Oles, Frank J., Methodology for creating and maintaining a scheme for categorizing electronic communications.
  140. Logan, James D.; Palmer, Mark; Call, Charles G., Methods and apparatus for creating, combining, distributing and reproducing program content for groups of participating users.
  141. McCarty,Scott F.; Hammock,Jeanette L., Methods and systems for coordinating sessions on one or more systems.
  142. Gatto, Joseph, Methods and systems for measuring performance of a security analyst.
  143. Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Robinson, David Neil; Pedersen, Bradley J., Methods and systems for providing remote access to a computing environment provided by a virtual machine.
  144. Douglas,Kevin, Modular system for detecting, filtering and providing notice about attack events associated with network security.
  145. Blackburn, Mark; Hawkins, Andrew, Monitoring a computer.
  146. Mitchell K. Bilder, Monitoring and notification method and apparatus.
  147. Kriz,Jeffrey J., Multi tier wireless communication system.
  148. Malloy, Patrick J.; Popa, Marius; Dunn, Antoine; Fuentes, Daniel; Hull, Christopher, Multi-tier message correlation.
  149. Paterik, Thomas L.; Weaver, Farni B.; Acosta, Irwin Joseph Butac; Kunkel, Philip M., Natural-language surveillance of packet-based communications.
  150. Wolf,Jonathan S.; Mellor,Arthur B.; Tackabury,Wayne F.; Anderson,Christopher B.; Whitworth,Robin M.; Haag,Michael D.; Del Vecchio,Brian A., Network configuration manager.
  151. Apte, Manoj; Jain, Sandeep; Budiyanto, Fritz; Duraiswamy, Senthil Kumar; Deenadayalan, Saravanan; Ko, Yulianto Kokasih, Network device having service card for dynamic flow capture and monitoring of packet flows.
  152. Kayashima,Makoto; Fujiyama,Tatsuya; Terada,Masato; Watanabe,Yoshinori; Ogino,Takaaki, Network management system for generating setup information for a plurality of devices based on common meta-level information.
  153. Frederic P. Messinger, Network navigation and viewing system for network management system.
  154. Bernet,Yoram; Moore,Timothy M.; Pabbati,Ramesh B., Network quality of service for qualitative applications.
  155. Sim,Lim Or; Cheong,Yee Han; Jarrett,Andrew Lawrence; Bey,Shefik; Eustace,Anthony Roger; Pettit,Matthew James, Network resource monitoring and measurement system and method.
  156. Porras Phillip A. ; Valdes Alfonso, Network surveillance.
  157. Inoue, Tsuyoshi; Ozawa, Jun, Operation supporting device and method for supporting operation.
  158. Brown, Jennifer B.; Dimarzio, Paul T.; Durniak, Timothy; Friedlander, Robert R.; Kraemer, James R., Optimizing it infrastructure configuration.
  159. Zamora Cura, Carlos A., Page load performance analysis.
  160. Johnson, Jeffrey V.; Fakes, Thomas F., Page-view recording with click-thru tracking.
  161. Johnson,Jeffrey V.; Fakes,Thomas F., Page-view recording with click-thru tracking.
  162. Montulli Lou, Persistant client state in a hypertext transfer protocol based client-server system.
  163. Deason, Neil A., Policy service system architecture for sessions created using STUN.
  164. Andreasen, Flemming S.; Rosenberg, Jonathan D., Policy-based control of content intercept.
  165. Wasser, Barry, Predicting system performance and capacity using software module performance statistics.
  166. Kaiserlian, Christian; Berenzweig, Adam; Huelsbergen, Lorenz, Presenting related communications.
  167. Shahine, Omar; Kunins, Jeffrey C.; Pearce, Douglas Ray; Hudspeth, Ann Marie, Progressively discovering and integrating services.
  168. Davidson, Andrew Jamie; Brooks, David John; Berry, Michael James, Providing dynamic quality of service for virtual private networks.
  169. Koga,Takahiro, QoS control middleware in integrated network, QoS control method, and the program for the same.
  170. Guruswamy, Kowsik, Remote aggregation of network traffic profiling data.
  171. Ghetie, Andrei; Tanna, Harshad; Unger, John; Kiss, Gabor; Massa, Vincent, Scalable and dynamic quality of service control.
  172. Ho Andrew P., Secure database management system for confidential records using separately encrypted identifier and access request.
  173. Synnestvedt,Robert Glenn; Franko,Tana Louise, Service and policy system integrity monitor.
  174. Hao, Jack Jianxiu; Ortiz, Guillermo; Stallings, Heath; Valdez, John P.; Xia, Wei; Geiger, Joseph M., Smart home device management.
  175. Sone, Masahiro, Storage control device and control method therefor.
  176. Sone,Masahiro, Storage control device and control method therefor.
  177. Sone,Masahiro, Storage control device and control method therefor.
  178. Lu, Larry L.; O Laughlen, Eric; Crowley, John, Supervising user interaction with online services.
  179. Oran, David R.; Drisko, Robert Andrew; Gahm, Joshua B.; Faheem, Atif, Surrogate stream for monitoring realtime media.
  180. Scoggins, Shwu Yan Chang; Greenstreet, Debbie E., Surveillance implementation in managed VOP networks.
  181. Steele,Doug; Hogan,Katherine; Schloss,Rheid, System and method for an enterprise-to-enterprise compare within a utility data center (UDC).
  182. O'Steen,Roberta R.; Reddick,Linda; Hodges, Jr.,Charles Y.; Walters,Jon Timothy; Huff,Leslie, System and method for automated network element database population.
  183. Lu, Chengdong; Chen, Wei; Zhou, Mi; Ding, Yi, System and method for configuration-driven deployment.
  184. Tindal,Glen D., System and method for configuring a network device.
  185. Nielsen Christopher Robbins ; Poston Ricky Lee ; Stair Stephen Gray ; Tsao I-Hsing, System and method for displaying the contents of a web page based on a user's interests.
  186. Martinez, Ronald; Davis, Marc Eliot; Spiegelman, Michael; Paretti, Christopher T.; Ghezzi, Nicola Stefano; Higgins, Christopher William; Kalaboukis, Chris, System and method for distributing media related to a location.
  187. Roese, John J.; Graham, Richard W., System and method for dynamic network policy management.
  188. Jamjoom, Hani T.; Podlaseck, Mark E.; Qu, Huiming; Ruan, Yaoping; Shae, Zon-Yin; Sheopuri, Anshul, System and method for dynamic rescheduling of multiple varying resources with user social mapping.
  189. Jamjoom, Hani T.; Podlaseck, Mark E.; Qu, Huiming; Ruan, Yaoping; Shae, Zon-Yin; Sheopuri, Anshul, System and method for dynamic rescheduling of multiple varying resources with user social mapping.
  190. Kouznetsov, Victor, System and method for dynamically detecting computer viruses through associative behavioral analysis of runtime state.
  191. Soles, William E.; Leon E. Morgan Jr.; Anth, Arthur J.; Thompson, Marion B.; O'Shea, Edward T.; Garguilo, Frank E.; Bowlin, Amy H.; Morgan, Joseph, System and method for evaluating the performance of a computer application.
  192. Lu, Chengdong; Chen, Wei; Zhou, Mi; Ding, Yi, System and method for exposing distributed transaction services as web services.
  193. Humes Donald Creig, System and method for filtering data received by a computer system.
  194. Marvit, David L., System and method for generating videoconference transcriptions.
  195. Schuetze, Hinrich; Chen, Francine R.; Pirolli, Peter L.; Pitkow, James E.; Chi, Ed H.; Li, Jun, System and method for identifying similarities among objects in a collection.
  196. Theodore E. Casellini, System and method for internet call management with text-to-speech messaging.
  197. Sidey Michael J., System and method for maintaining compatibility among network nodes connected to a computer network.
  198. Dyor, Matthew Graham, System and method for managing personal information.
  199. Glade, Bradford B.; Harvey, David W.; Kemeny, John; Waxman, Matthew D., System and method for managing provisioning of storage resources in a network with virtualization of resources in such a network.
  200. Piccirilli,Anthony; Loesch,Kevin; Ryan,Thomas, System and method for measuring middleware response time.
  201. Muret, Paul Nicolas; Moon, Hui Sok, System and method for monitoring and analyzing internet traffic.
  202. Muret, Paul Nicolas; Moon, Hui Sok, System and method for monitoring and analyzing internet traffic.
  203. Philip D. Olson, System and method for monitoring current consumption from current share components.
  204. Johnson Charles George ; Lakshmi-Ratan Ramnath A. ; Lanning Steven G. ; Renger Bernard S L, System and method for monitoring information flow and performing data collection.
  205. Bunch, Clinton D., System and method for monitoring the internet access of a computer.
  206. Davis,Owen; Jain,Vidyut, System and method for monitoring the use of a resource by a client connected to a computer network having one or more servers in communication with one or more clients.
  207. Thomas, Oran M.; Gorman, Robert F.; Beal, Steven K.; Wilson, Steve, System and method for monitoring user interaction with web pages.
  208. Wittenstein, Andreas; Eynon, Mike; Mather, Laura; Lloyd, Jim; Frantz, Matt, System and method for network security including detection of attacks through partner websites.
  209. Begeja, Lee; Liu, Zhu; Renger, Bernard S.; Shahraray, Behzad; Basso, Andrea; Gibbon, David C.; Kumar, Sumit; Zavesky, Eric, System and method for notification of events of interest during a video conference.
  210. Simpson,Anita Hogans, System and method for notifying an offline global computer network user of an online interaction.
  211. Zilberstein, Moshe; Matsliach, Gaby; Ronen, Avner; Ventura, Ronen; Rousso, Benny; Buber, Shai, System and method for processing and presenting internet usage information.
  212. Ignatius,Paul; Prahlad,Anand; Tyagarajan,Mahesh; Vijayan Retnamma,Manoj; Amarendran,Arun; Kottomtharayil,Rajiv, System and method for providing encryption in a storage network by storing a secured encryption key with encrypted archive data in an archive storage device.
  213. Duncan,William E.; Hwang,Vincent, System and method for providing expandable proxy firewall services.
  214. Bustamente, Michael G., System and method for providing sequenced anonymous communication sessions over a network.
  215. Applegate John ; Romatoski Jeff, System and method for redirecting network traffic to provide secure communication.
  216. Mitrov, Vesselin P., System and method for reducing data traffic associated with a messaging service in a clustered server environment.
  217. von Mueller, Clay; Yale, Scott R.; Hazel, Patrick K.; Catinella, Paul, System and method for secure transaction.
  218. Morris, Robert P., System and method for tracking user activity related to network resources using a browser.
  219. Avner, Jon; Li, Wilson; Jasapara, Nirav; Bublichenko, Oleksandr; Usher, Sean; Chung, Charlie; Jalobeanu, Mihai; Padmanabhan, Prasanna Kumar, System comprising probe runner, monitor, and responder with associated databases for multi-level monitoring of a cloud service.
  220. Hendrick,Colin, System for automatic connection to a network.
  221. Tso, Michael Man-Hak; Romrell, David Alfred; Bakshi, Bikram Singh, System for delivery of dynamic content to a client device.
  222. Nielsen, Eric H. S.; Varghese, Biju, System, method, and computer program for reporting a communication flow to a lawful intercept framework.
  223. Singh, Man Jit; Cancel, David, Systems and methods for clickstream analysis to modify an off-line business process involving product pricing.
  224. Singh, Man Jit; Cancel, David, Systems and methods for clickstream analysis to modify an off-line business process involvng cross promotion.
  225. Narin, Dogu; Tully, Siobhan; Payne, David, Systems and methods for interfacing with network information collection devices.
  226. Narin, Dogu; Tully, Siobhan; Payne, David, Systems and methods for interfacing with network information collection devices.
  227. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger, Systems and methods for managing cryptographic keys.
  228. Agarwal Neeraj ; Perret Pierre ; McMenemy Michael G., Systems and methods for monitoring distributed applications including an interface running in an operating system kernel.
  229. Schlottmann, Alan, Systems and methods for multivariate influence analysis of heterogenous mixtures of categorical and continuous data.
  230. Sciacca, Alan, Systems and methods for standardizing network devices.
  231. Bardsley,Jeffrey S.; Brock,Ashley A.; Davis, III,Charles K.; Kim,Nathaniel W.; McKenna,John J.; Villegas,Carlos F., Systems, methods and computer program products for administration of computer security threat countermeasures to a computer system.
  232. Ansell Steven T. ; Cherenson Andrew R., Territorial determination of remote computer location in a wide area network for conditional delivery of digitized products.
  233. Narin,Attila; Kegley,Keith A.; Sobeski,David A., Tracking usage behavior in computer systems.
  234. Sheppard, Scott, Traffic analysis for a lawful interception system.
  235. Apte, Manoj; Udupa, Sivprasad; Motyashov, Alex; Devarajan, Srikanth, Traffic redirection in cloud based security services.
  236. Schrodi,Karl, Traffic restriction for a network with QoS transmission.
  237. Ebert, Peter S., User feedback system.
  238. Kusumoto,Koji; Ito,Akiumi; Oikawa,Kazushige, User operation log recording and storing apparatus using object-oriented technology.
  239. McCarthy,James Mark; McCarthy,Michelle Lee, Using multiple simultaneous threads of communication.
  240. Sheppard, Scott, Verifying a lawful interception system.
  241. De Pauw, Wim; Malkin, Peter K., Visualizing jobs in a distributed environment with limited resources.
  242. Waldorf,Jerry A.; Lu,Yanbing; Demetriades,Alex, Web browser as web service server in interaction with business process engine.
  243. Yin, Aihao; Lin, Yifei, Web service assisted real-time session peering between enterprise VoIP networks via internet.
  244. Pogue Michael Alan ; Werner Laura Allison ; Pfeiffer Ralf I. ; Gupta Pratima ; Zhang Yong ; Clark James Andrew, Web site client information tracker.
  245. Poulsen, Thomas; Munday, Terence; Mathers, Trevor; Golla, Manohar, Widget host container component for a rapid application development tool.
  246. Bryant Raymond Morris ; Hoffman Richard Dale ; Kahn Samuel, World wide web end user response time monitor.

이 특허를 인용한 특허 (1)

  1. Nimry, Basil F.; Gillis, Nicholas, Verifying secure transactions through distributed nodes.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트