Movatterモバイル変換


[0]ホーム

URL:


US20050138204A1 - Virtual private network having automatic reachability updating - Google Patents

Virtual private network having automatic reachability updating
Download PDF

Info

Publication number
US20050138204A1
US20050138204A1US10/983,840US98384004AUS2005138204A1US 20050138204 A1US20050138204 A1US 20050138204A1US 98384004 AUS98384004 AUS 98384004AUS 2005138204 A1US2005138204 A1US 2005138204A1
Authority
US
United States
Prior art keywords
policy
vpn
networks
edge device
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/983,840
Inventor
Shanker Iyer
Mahadevan Iyer
William Hunt
Rahul Kale
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filedlitigationCriticalhttps://patents.darts-ip.com/?family=27585810&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=US20050138204(A1)"Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by IndividualfiledCriticalIndividual
Priority to US10/983,840priorityCriticalpatent/US20050138204A1/en
Publication of US20050138204A1publicationCriticalpatent/US20050138204A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A unified policy management system for an organization including a central policy server and remotely situated policy enforcers. A central database and policy enforcer databases storing policy settings are configured as LDAP databases adhering to a hierarchical object oriented structure. Such structure allows the policy settings to be defined in an intuitive and extensible fashion. Changes in the policy settings made at the central policy server are automatically transferred to the policy enforcers for updating their respective databases. Each policy enforcer collects and transmits health and status information in a predefined log format and transmits it to the policy server for efficient monitoring by the policy server. For further efficiencies, the policy enforcement functionalities of the policy enforcers are effectively partitioned so as to be readily implemented in hardware. The system also provides for dynamically routed VPNs where VPN membership lists are automatically created and shared with the member policy enforcers. Updates to such membership lists are also automatically transferred to remote VPN clients. The system further provides for fine grain access control of the traffic in the VPN by allowing definition of firewall rules within the VPN. In addition, policy server and policy enforcers may be configured for high availability by maintaining a backup unit in addition to a primary unit. The backup unit become active upon failure of the primary unit.

Description

Claims (16)

US10/983,8401999-06-102004-11-08Virtual private network having automatic reachability updatingAbandonedUS20050138204A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US10/983,840US20050138204A1 (en)1999-06-102004-11-08Virtual private network having automatic reachability updating

Applications Claiming Priority (18)

Application NumberPriority DateFiling DateTitle
US13903399P1999-06-101999-06-10
US13903599P1999-06-101999-06-10
US13905299P1999-06-101999-06-10
US13904899P1999-06-101999-06-10
US13904799P1999-06-101999-06-10
US13884999P1999-06-101999-06-10
US13904299P1999-06-101999-06-10
US13905399P1999-06-101999-06-10
US13903899P1999-06-101999-06-10
US13903499P1999-06-101999-06-10
US13904499P1999-06-101999-06-10
US13885099P1999-06-101999-06-10
US13904399P1999-06-101999-06-10
US13904999P1999-06-101999-06-10
US13903699P1999-06-101999-06-10
US13907699P1999-06-111999-06-11
US59207900A2000-06-122000-06-12
US10/983,840US20050138204A1 (en)1999-06-102004-11-08Virtual private network having automatic reachability updating

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US59207900AContinuation1999-06-102000-06-12

Publications (1)

Publication NumberPublication Date
US20050138204A1true US20050138204A1 (en)2005-06-23

Family

ID=27585810

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US09/592,165Expired - LifetimeUS6944183B1 (en)1999-06-102000-06-12Object model for network policy management
US09/592,083Expired - LifetimeUS6678835B1 (en)1999-06-102000-06-12State transition protocol for high availability units
US10/983,840AbandonedUS20050138204A1 (en)1999-06-102004-11-08Virtual private network having automatic reachability updating

Family Applications Before (2)

Application NumberTitlePriority DateFiling Date
US09/592,165Expired - LifetimeUS6944183B1 (en)1999-06-102000-06-12Object model for network policy management
US09/592,083Expired - LifetimeUS6678835B1 (en)1999-06-102000-06-12State transition protocol for high availability units

Country Status (7)

CountryLink
US (3)US6944183B1 (en)
EP (1)EP1145519B1 (en)
JP (2)JP2003502757A (en)
CN (1)CN100384191C (en)
AT (5)ATE360937T1 (en)
AU (1)AU5486800A (en)
WO (1)WO2000078004A2 (en)

Cited By (126)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020103783A1 (en)*2000-12-012002-08-01Network Appliance, Inc.Decentralized virus scanning for stored data
US20040168090A1 (en)*1999-10-122004-08-26Webmd Corp.System and method for delegating a user authentication process for a networked application to an authentication agent
US20040172464A1 (en)*2000-07-282004-09-02Siddhartha NagEnd-to-end service quality for latency-intensive internet protocol (IP) applications in a heterogeneous, multi-vendor environment
US20040230795A1 (en)*2000-12-012004-11-18Armitano Robert M.Policy engine to control the servicing of requests received by a storage server
US20050267954A1 (en)*2004-04-272005-12-01Microsoft CorporationSystem and methods for providing network quarantine
US20060010227A1 (en)*2004-06-012006-01-12Rajeev AtluriMethods and apparatus for accessing data from a primary data storage system for secondary storage
US20060020694A1 (en)*2000-07-282006-01-26Prominence Networks, Inc.Administering a communication network
US20060031468A1 (en)*2004-06-012006-02-09Rajeev AtluriSecondary data storage and recovery system
US20060056314A1 (en)*2003-09-182006-03-16Olivier DauresDiscovery of virtual private networks
US20060072589A1 (en)*2004-09-302006-04-06Mandavilli Swamy JMethod and system for managing network nodes which communicate via connectivity services of a service provider
US20060085850A1 (en)*2004-10-142006-04-20Microsoft CorporationSystem and methods for providing network quarantine using IPsec
US20060184647A1 (en)*2005-02-162006-08-17Dixit Vineet RMethod and apparatus to modify network identifiers at data servers
US20060224719A1 (en)*2005-03-302006-10-05Integrated Informatics, Inc.Operator simulator and non-invasive interface engine
US20070143392A1 (en)*2005-12-152007-06-21Microsoft CorporationDynamic remediation
US20070192323A1 (en)*2006-02-102007-08-16Vertical Systems, Inc.System and method of access and control management between multiple databases
US20070198525A1 (en)*2006-02-132007-08-23Microsoft CorporationComputer system with update-based quarantine
US7266683B1 (en)*2001-07-272007-09-04Siddhartha NagSelective encryption of application session packets
US20070206597A1 (en)*2006-03-012007-09-06Rajiv AsatiMethods and apparatus for providing an enhanced dynamic multipoint virtual private network architecture
US20070234040A1 (en)*2006-03-312007-10-04Microsoft CorporationNetwork access protection
WO2007072245A3 (en)*2005-12-212007-10-11Koninkl Philips Electronics NvDynamic firewall rule definition
US20070244938A1 (en)*2006-04-172007-10-18Microsoft CorporationCreating host-level application-consistent backups of virtual machines
US7293067B1 (en)*1999-07-162007-11-06Canon Kabushiki KaishaSystem for searching device on network
US20070260649A1 (en)*2006-05-022007-11-08International Business Machines CorporationDetermining whether predefined data controlled by a server is replicated to a client machine
US20070271304A1 (en)*2006-05-192007-11-22Inmage Systems, Inc.Method and system of tiered quiescing
US20070271428A1 (en)*2006-05-192007-11-22Inmage Systems, Inc.Method and apparatus of continuous data backup and access using virtual machines
US20070282921A1 (en)*2006-05-222007-12-06Inmage Systems, Inc.Recovery point data view shift through a direction-agnostic roll algorithm
US20080059542A1 (en)*2006-08-302008-03-06Inmage Systems, Inc.Ensuring data persistence and consistency in enterprise storage backup systems
US20080056160A1 (en)*2006-08-312008-03-06Fujitsu LimitedInformation processing system, information processing apparatus, information processing method and program
US20080115218A1 (en)*2006-11-102008-05-15Microsoft CorporationExtensible framework for system security state reporting and remediation
US20080123675A1 (en)*2006-11-292008-05-29Fujitsu LimitedData transmission apparatus and data transmission method
WO2008021075A3 (en)*2006-08-082008-06-26Cipheroptics IncMultiple security groups with common keys on distributed networks
CN100401706C (en)*2005-10-242008-07-09杭州华三通信技术有限公司Access method and system for client end of virtual private network
US20080225700A1 (en)*2005-09-152008-09-18International Business Machines CorporationProtocol Definition for Software Bridge Failover
US20080256029A1 (en)*2007-04-132008-10-16Acei AbPartition management system
US7467229B1 (en)*2007-06-202008-12-16Direct Route, LlcMethod and apparatus for routing of network addresses
US7526677B2 (en)2005-10-312009-04-28Microsoft CorporationFragility handling
US7533407B2 (en)2003-12-162009-05-12Microsoft CorporationSystem and methods for providing network quarantine
US20090168657A1 (en)*2007-12-302009-07-02Rahoul PuriSystem and Method for Validating Packet Classification
US20090281816A1 (en)*2005-08-292009-11-12Daikin Industries, Ltd.Account abuse detection or prevention device, data collection device, and account abuse detection or prevention program
US20090313503A1 (en)*2004-06-012009-12-17Rajeev AtluriSystems and methods of event driven recovery management
US20100023797A1 (en)*2008-07-252010-01-28Rajeev AtluriSequencing technique to account for a clock error in a backup system
US7689722B1 (en)*2002-10-072010-03-30Cisco Technology, Inc.Methods and apparatus for virtual private network fault tolerance
US20100083032A1 (en)*2008-09-302010-04-01Alcorn Byron AConnection broker assignment status reporting
US20100100949A1 (en)*2007-07-062010-04-22Abhilash Vijay SonwaneIdentity and policy-based network security and management system and method
US20100115104A1 (en)*2000-11-032010-05-06Tagg James PCooperative network for mobile internet access
US20100169592A1 (en)*2008-12-262010-07-01Rajeev AtluriGenerating a recovery snapshot and creating a virtual view of the recovery snapshot
US20100169587A1 (en)*2005-09-162010-07-01Rajeev AtluriCausation of a data read against a first storage system to optionally store a data write to preserve the version to allow viewing and recovery
US20100169591A1 (en)*2005-09-162010-07-01Rajeev AtluriTime ordered view of backup data on behalf of a host
US20100169281A1 (en)*2006-05-222010-07-01Rajeev AtluriCoalescing and capturing data between events prior to and after a temporal window
US20100169452A1 (en)*2004-06-012010-07-01Rajeev AtluriCausation of a data read operation against a first storage system by a server associated with a second storage system according to a host generated instruction
US20100169282A1 (en)*2004-06-012010-07-01Rajeev AtluriAcquisition and write validation of data of a networked host node to perform secondary storage
WO2010077222A1 (en)*2008-12-302010-07-08Thomson LicensingSynchronization of configurations for display systems
US7774468B1 (en)2000-07-282010-08-10Siddhartha NagNetwork traffic admission control
US7783666B1 (en)2007-09-262010-08-24Netapp, Inc.Controlling access to storage resources by using access pattern based quotas
US20100217850A1 (en)*2009-02-242010-08-26James Michael FerrisSystems and methods for extending security platforms to cloud-based networks
WO2011056317A1 (en)*2009-10-272011-05-12Motorola Solutions, Inc.Method for providing security associations for encrypted packet data
US20110119381A1 (en)*2009-11-162011-05-19Rene GloverMethods and apparatus to allocate resources associated with a distributive computing network
US20110142053A1 (en)*2009-12-152011-06-16Jacobus Van Der MerweMethods and apparatus to communicatively couple virtual private networks to virtual machines within distributive computing networks
US7979656B2 (en)2004-06-012011-07-12Inmage Systems, Inc.Minimizing configuration changes in a fabric-based data protection solution
US20110209141A1 (en)*2010-02-252011-08-25Red Hat, Inc.Managing a user proxy configuration in a daemon that frequently loads and unloads and is used by multiple users simultaneously
US8069227B2 (en)2008-12-262011-11-29Inmage Systems, Inc.Configuring hosts of a secondary data storage and recovery system
US20120017085A1 (en)*2010-07-152012-01-19Carter Stephen RTechniques for identity-enabled interface deployment
US20120023213A1 (en)*2009-02-052012-01-26Ipanema TechnologiesMethod for management of data stream exchanges in an autonomic telecommunications network
US8201237B1 (en)2008-12-102012-06-12Amazon Technologies, Inc.Establishing secure remote access to private computer networks
US8230050B1 (en)*2008-12-102012-07-24Amazon Technologies, Inc.Providing access to configurable private computer networks
US20130064088A1 (en)*2011-09-092013-03-14Futurewei Technologies, Inc.Apparatus and System for Packet Routing and Forwarding in an Interior Network
US8428074B2 (en)2005-04-292013-04-23Prom Ks Mgmt Limited Liability CompanyBack-to back H.323 proxy gatekeeper
US8452876B1 (en)*2006-09-052013-05-28Blue Coat Systems, Inc.Graphical configuration interface for network policy
US8458332B2 (en)2000-07-282013-06-04Prom Ks Mgmt Limited Liability CompanyMultiplexing several individual application sessions over a pre-allocated reservation protocol session
US8473557B2 (en)2010-08-242013-06-25At&T Intellectual Property I, L.P.Methods and apparatus to migrate virtual machines between distributive computing networks across a wide area network
US8527470B2 (en)2006-05-222013-09-03Rajeev AtluriRecovery point data view formation with generation of a recovery view and a coalesce policy
US20140115654A1 (en)*2012-10-222014-04-24Centripetal Networks, Inc.Methods and systems for protecting a secured network
US20140280461A1 (en)*2013-03-152014-09-18Aerohive Networks, Inc.Providing stateless network services
US20140325037A1 (en)*2013-04-292014-10-30Amazon Technologies, Inc.Automated Creation of Private Virtual Networks in a Service Provider Network
US9015484B2 (en)2007-12-142015-04-21Intel CorporationSymmetric key distribution framework for the Internet
US9094445B2 (en)2013-03-152015-07-28Centripetal Networks, Inc.Protecting networks from cyber attacks and overloading
US9124552B2 (en)2013-03-122015-09-01Centripetal Networks, Inc.Filtering network data transfers
US9137209B1 (en)2008-12-102015-09-15Amazon Technologies, Inc.Providing local secure network access to remote services
US9203806B2 (en)2013-01-112015-12-01Centripetal Networks, Inc.Rule swapping in a packet network
US20150350183A1 (en)*2012-08-302015-12-03Aerohive Networks, Inc.Internetwork Authentication
US9225684B2 (en)2007-10-292015-12-29Microsoft Technology Licensing, LlcControlling network access
US9264370B1 (en)2015-02-102016-02-16Centripetal Networks, Inc.Correlating packets in communications networks
US9386035B2 (en)2011-06-212016-07-05At&T Intellectual Property I, L.P.Methods and apparatus to configure virtual private mobile networks for security
US9397978B1 (en)*2012-12-212016-07-19Western Digital Technologies, Inc.Cloud to local router security
WO2016115409A1 (en)*2015-01-142016-07-21Datto, Inc.Remotely configurable routers with failover features, and methods and apparatus for reliable web-based administration of same
US9413722B1 (en)2015-04-172016-08-09Centripetal Networks, Inc.Rule-based network-threat detection
US9432258B2 (en)2011-06-062016-08-30At&T Intellectual Property I, L.P.Methods and apparatus to configure virtual private mobile networks to reduce latency
US9516061B2 (en)2013-11-262016-12-06Cisco Technology, Inc.Smart virtual private network
US9524167B1 (en)2008-12-102016-12-20Amazon Technologies, Inc.Providing location-specific network access to remote services
US9558078B2 (en)2014-10-282017-01-31Microsoft Technology Licensing, LlcPoint in time database restore from storage snapshots
US9565213B2 (en)2012-10-222017-02-07Centripetal Networks, Inc.Methods and systems for protecting a secured network
US9753784B2 (en)2013-11-272017-09-05At&T Intellectual Property I, L.P.Cloud delivery platform
US9769056B2 (en)2013-03-152017-09-19Aerohive Networks, Inc.Gateway using multicast to unicast conversion
US9836347B2 (en)2013-08-092017-12-05Datto, Inc.Apparatuses, methods and systems for determining a virtual machine state
US9917856B2 (en)2015-12-232018-03-13Centripetal Networks, Inc.Rule-based network-threat detection for encrypted communications
US9992619B2 (en)2014-08-122018-06-05Aerohive Networks, Inc.Network device based proximity beacon locating
US10044678B2 (en)2011-08-312018-08-07At&T Intellectual Property I, L.P.Methods and apparatus to configure virtual private mobile networks with virtual private networks
US10284526B2 (en)2017-07-242019-05-07Centripetal Networks, Inc.Efficient SSL/TLS proxy
US10326801B2 (en)2013-02-052019-06-18Fortinet, Inc.Cloud-based security policy configuration
US10333898B1 (en)2018-07-092019-06-25Centripetal Networks, Inc.Methods and systems for efficient network protection
US10503899B2 (en)2017-07-102019-12-10Centripetal Networks, Inc.Cyberanalysis workflow acceleration
US10594713B2 (en)2017-11-102020-03-17Secureworks Corp.Systems and methods for secure propagation of statistical models within threat intelligence communities
US10735470B2 (en)2017-11-062020-08-04Secureworks Corp.Systems and methods for sharing, distributing, or accessing security data and/or security applications, models, or analytics
US10785238B2 (en)2018-06-122020-09-22Secureworks Corp.Systems and methods for threat discovery across distinct organizations
US10797933B2 (en)2015-01-142020-10-06Datto, Inc.Remotely configurable routers with failover features, and methods and apparatus for reliable web-based administration of same
US10841337B2 (en)2016-11-282020-11-17Secureworks Corp.Computer implemented system and method, and computer program product for reversibly remediating a security risk
US10846070B2 (en)2018-07-052020-11-24At&T Intellectual Property I, L.P.Facilitating cloud native edge computing via behavioral intelligence
US10872016B2 (en)2015-06-162020-12-22Datto, Inc.Hybrid cloud methods, apparatus and systems for secure file sharing and synchronization with backup and server virtualization
US11003718B2 (en)2018-06-122021-05-11Secureworks Corp.Systems and methods for enabling a global aggregated search, while allowing configurable client anonymity
US11159546B1 (en)2021-04-202021-10-26Centripetal Networks, Inc.Methods and systems for efficient threat context-aware packet filtering for network protection
US11209803B2 (en)*2016-07-122021-12-28Siemens AktiengesellschaftFirewall system and method for establishing secured communications connections to an industrial automation system
US11233777B2 (en)2017-07-242022-01-25Centripetal Networks, Inc.Efficient SSL/TLS proxy
US11290425B2 (en)*2016-02-012022-03-29Airwatch LlcConfiguring network security based on device management characteristics
US11310268B2 (en)2019-05-062022-04-19Secureworks Corp.Systems and methods using computer vision and machine learning for detection of malicious actions
US11349877B2 (en)*2019-06-202022-05-31Servicenow, Inc.Solution management systems and methods for addressing cybersecurity vulnerabilities
US11381589B2 (en)2019-10-112022-07-05Secureworks Corp.Systems and methods for distributed extended common vulnerabilities and exposures data management
US11418524B2 (en)2019-05-072022-08-16SecureworksCorp.Systems and methods of hierarchical behavior activity modeling and detection for systems-level security
US11522877B2 (en)2019-12-162022-12-06Secureworks Corp.Systems and methods for identifying malicious actors or activities
US11528294B2 (en)2021-02-182022-12-13SecureworksCorp.Systems and methods for automated threat detection
US11539664B2 (en)2020-10-272022-12-27Centripetal Networks, Inc.Methods and systems for efficient adaptive logging of cyber threat incidents
US11588834B2 (en)2020-09-032023-02-21Secureworks Corp.Systems and methods for identifying attack patterns or suspicious activity in client networks
US20230112579A1 (en)*2021-10-112023-04-13Hewlett Packard Enterprise Development LpAutomatic policy engine selection
US11729144B2 (en)2016-01-042023-08-15Centripetal Networks, LlcEfficient packet capture for cyber threat analysis
US12015623B2 (en)2022-06-242024-06-18Secureworks Corp.Systems and methods for consensus driven threat intelligence
US12034751B2 (en)2021-10-012024-07-09Secureworks Corp.Systems and methods for detecting malicious hands-on-keyboard activity via machine learning
US12135789B2 (en)2021-08-042024-11-05Secureworks Corp.Systems and methods of attack type and likelihood prediction

Families Citing this family (365)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8914410B2 (en)1999-02-162014-12-16Sonicwall, Inc.Query interface to policy server
US7821926B2 (en)1997-03-102010-10-26Sonicwall, Inc.Generalized policy server
US7272625B1 (en)*1997-03-102007-09-18Sonicwall, Inc.Generalized policy server
US6408336B1 (en)1997-03-102002-06-18David S. SchneiderDistributed administration of access to information
GB2368692B (en)1999-06-252003-02-12Jacobs Rimell LtdAutomated provisioning system
US7106756B1 (en)1999-10-122006-09-12Mci, Inc.Customer resources policy control for IP traffic delivery
US7369536B2 (en)*1999-11-022008-05-06Verizon Business Global LlcMethod for providing IP telephony with QoS using end-to-end RSVP signaling
US6970930B1 (en)*1999-11-052005-11-29Mci, Inc.Method and system of providing differentiated services
US7213068B1 (en)*1999-11-122007-05-01Lucent Technologies Inc.Policy management system
EP1117265A1 (en)*2000-01-152001-07-18Telefonaktiebolaget Lm EricssonMethod and apparatus for global roaming
US7016980B1 (en)*2000-01-182006-03-21Lucent Technologies Inc.Method and apparatus for analyzing one or more firewalls
US20010037384A1 (en)*2000-05-152001-11-01Brian JemesSystem and method for implementing a virtual backbone on a common network infrastructure
US7032023B1 (en)*2000-05-162006-04-18America Online, Inc.Throttling electronic communications from one or more senders
US7418489B2 (en)*2000-06-072008-08-26Microsoft CorporationMethod and apparatus for applying policies
US7444395B2 (en)*2000-06-072008-10-28Microsoft CorporationMethod and apparatus for event handling in an enterprise
US7174557B2 (en)2000-06-072007-02-06Microsoft CorporationMethod and apparatus for event distribution and event handling in an enterprise
US7171459B2 (en)*2000-06-072007-01-30Microsoft CorporationMethod and apparatus for handling policies in an enterprise
US7032031B2 (en)*2000-06-232006-04-18Cloudshield Technologies, Inc.Edge adapter apparatus and method
US7711790B1 (en)2000-08-242010-05-04Foundry Networks, Inc.Securing an accessible computer system
US7725587B1 (en)2000-08-242010-05-25Aol LlcDeep packet scan hacker identification
US7120144B1 (en)*2000-09-202006-10-10Ipolicy Networks, Inc.Universal application decode engine
US7113900B1 (en)2000-10-242006-09-26Microsoft CorporationSystem and method for logical modeling of distributed computer systems
US7606898B1 (en)2000-10-242009-10-20Microsoft CorporationSystem and method for distributed management of shared computers
US6907395B1 (en)*2000-10-242005-06-14Microsoft CorporationSystem and method for designing a logical model of a distributed computer system and deploying physical resources according to the logical model
CA2327211A1 (en)*2000-12-012002-06-01Nortel Networks LimitedManagement of log archival and reporting for data network security systems
US7353269B2 (en)*2000-12-212008-04-01Fujitsu LimitedNetwork monitoring system
US8176137B2 (en)2001-01-312012-05-08Accenture Global Services LimitedRemotely managing a data processing system via a communications network
US7389341B2 (en)2001-01-312008-06-17Accenture LlpRemotely monitoring a data processing system via a communications network
US7096256B1 (en)*2001-02-262006-08-22Juniper Network, Inc.Applying configuration group information to target configuration information
US7222255B1 (en)*2001-02-282007-05-223Com CorporationSystem and method for network performance testing
US7069337B2 (en)*2001-03-202006-06-27Mci, Inc.Policy-based synchronization of per-class resources between routers in a data network
US8660017B2 (en)2001-03-202014-02-25Verizon Business Global LlcSystems and methods for updating IP communication service attributes using an LDAP
US7796608B2 (en)*2001-03-202010-09-14Verizon Business Global LlcEdge-based per-flow QoS admission control in a data network
US20020138603A1 (en)*2001-03-202002-09-26Robohm Kurt W.Systems and methods for updating IP communication service attributes
US8341116B2 (en)2001-03-202012-12-25Verizon Business Global LlcSystems and methods for updating an LDAP
US6990518B1 (en)2001-03-222006-01-24Agilent Technologies, Inc.Object-driven network management system enabling dynamically definable management behavior
US7093280B2 (en)*2001-03-302006-08-15Juniper Networks, Inc.Internet security system
DE10117133B4 (en)*2001-04-052005-07-07T-Mobile Deutschland Gmbh Method and device for path control of IP connections in a subscriber-based communication network
US7536715B2 (en)2001-05-252009-05-19Secure Computing CorporationDistributed firewall system and method
US7130839B2 (en)*2001-05-292006-10-31Sun Microsystems, Inc.Method and system for grouping entries in a directory server by group memberships defined by roles
US8385342B2 (en)2001-05-312013-02-26Fujitsu LimitedSystem and method of virtual private network route target filtering
US8014283B2 (en)*2001-06-012011-09-06Fujitsu LimitedSystem and method for topology constrained QoS provisioning
US20020184388A1 (en)*2001-06-012002-12-05Nimer YaseenLayered approach to virtual private routing
US7450505B2 (en)*2001-06-012008-11-11Fujitsu LimitedSystem and method for topology constrained routing policy provisioning
US7526480B2 (en)2001-06-082009-04-28Cisco Technology, Inc.Method and apparatus for controlled access of requests from virtual private network devices to managed information objects using simple network management protocol and multi-topology routing
US7099947B1 (en)*2001-06-082006-08-29Cisco Technology, Inc.Method and apparatus providing controlled access of requests from virtual private network devices to managed information objects using simple network management protocol
US20030018774A1 (en)*2001-06-132003-01-23Nokia CorporationSystem and method for load balancing in ad hoc networks
US7418536B2 (en)*2001-07-302008-08-26Cisco Technology, Inc.Processor having systolic array pipeline for processing data packets
US7072958B2 (en)2001-07-302006-07-04Intel CorporationIdentifying network management policies
US7382787B1 (en)2001-07-302008-06-03Cisco Technology, Inc.Packet routing and switching device
JP2003051857A (en)*2001-08-062003-02-21Nec CorpData communication system, data communication terminal and data communication method used by the terminal, and its program
US7177869B2 (en)*2001-09-192007-02-13Fuji Xerox Co., Ltd.Service retrieving apparatus and service retrieving method
GB0123057D0 (en)*2001-09-252001-11-14Red M Communications LtdVirtual wireless network services
EP2403219B1 (en)2001-09-282014-10-22Level 3 CDN International, Inc.Method for name to address resolution
US8776230B1 (en)2001-10-022014-07-08Mcafee, Inc.Master security policy server
FI20011949A0 (en)*2001-10-052001-10-05Stonesoft Corp Managing a Virtual Private Network
US7043660B1 (en)*2001-10-082006-05-09Agilent Technologies, Inc.System and method for providing distributed fault management policies in a network management system
US7765313B2 (en)2001-10-092010-07-27Alcatel LucentHierarchical protocol classification engine
NO316737B1 (en)*2001-11-082004-04-19Beep Science As Arrangement and procedure for content control of data objects, especially data objects in MMS messages
US7318095B2 (en)*2001-11-212008-01-08Clearcube Technology, Inc.Data fail-over for a multi-computer system
US7921288B1 (en)2001-12-122011-04-05Hildebrand Hal SSystem and method for providing different levels of key security for controlling access to secured items
US7921284B1 (en)2001-12-122011-04-05Gary Mark KinghornMethod and system for protecting electronic data in enterprise environment
US7260555B2 (en)2001-12-122007-08-21Guardian Data Storage, LlcMethod and architecture for providing pervasive security to digital assets
USRE41546E1 (en)2001-12-122010-08-17Klimenty VainsteinMethod and system for managing security tiers
US8006280B1 (en)2001-12-122011-08-23Hildebrand Hal SSecurity system for generating keys from access rules in a decentralized manner and methods therefor
US7930756B1 (en)2001-12-122011-04-19Crocker Steven ToyeMulti-level cryptographic transformations for securing digital assets
US7380120B1 (en)2001-12-122008-05-27Guardian Data Storage, LlcSecured data format for access control
US7565683B1 (en)2001-12-122009-07-21Weiqing HuangMethod and system for implementing changes to security policies in a distributed security system
US10033700B2 (en)2001-12-122018-07-24Intellectual Ventures I LlcDynamic evaluation of access rights
US7562232B2 (en)*2001-12-122009-07-14Patrick ZuiliSystem and method for providing manageability to security information for secured items
US8065713B1 (en)2001-12-122011-11-22Klimenty VainsteinSystem and method for providing multi-location access management to secured items
US7921450B1 (en)2001-12-122011-04-05Klimenty VainsteinSecurity system using indirect key generation from access rules and methods therefor
US7681034B1 (en)2001-12-122010-03-16Chang-Ping LeeMethod and apparatus for securing electronic data
US7631184B2 (en)2002-05-142009-12-08Nicholas RyanSystem and method for imposing security on copies of secured items
US7478418B2 (en)*2001-12-122009-01-13Guardian Data Storage, LlcGuaranteed delivery of changes to security policies in a distributed system
US10360545B2 (en)2001-12-122019-07-23Guardian Data Storage, LlcMethod and apparatus for accessing secured electronic data off-line
US7178033B1 (en)2001-12-122007-02-13Pss Systems, Inc.Method and apparatus for securing digital assets
US7950066B1 (en)2001-12-212011-05-24Guardian Data Storage, LlcMethod and system for restricting use of a clipboard application
AU2002366828A1 (en)*2001-12-212003-07-09Charles S. MuirheadSystem for supply chain management of virtual private network services
CN100403293C (en)*2002-01-282008-07-16特瑞帝德国际公司 Network system method and protocol for hierarchical service and content distribution
US8176334B2 (en)2002-09-302012-05-08Guardian Data Storage, LlcDocument security system that permits external users to gain access to secured files
US7093283B1 (en)*2002-02-152006-08-15Cisco Technology, Inc.Method and apparatus for deploying configuration instructions to security devices in order to implement a security policy on a network
JP2003242123A (en)*2002-02-212003-08-29Hitachi Ltd Collaborative access control method
CN1318999C (en)*2002-03-202007-05-30汤姆森特许公司 Video conferencing system structure
US20050071657A1 (en)*2003-09-302005-03-31Pss Systems, Inc.Method and system for securing digital assets using time-based security criteria
US8613102B2 (en)2004-03-302013-12-17Intellectual Ventures I LlcMethod and system for providing document retention using cryptography
US7748045B2 (en)2004-03-302010-06-29Michael Frederick KenrichMethod and system for providing cryptographic document retention with off-line access
US7603450B2 (en)*2002-04-262009-10-13Hewlett-Packard Development Company, L.P.Methods and applets for providing and contributing to an IT network management service
US7159242B2 (en)*2002-05-092007-01-02International Business Machines CorporationSecure IPsec tunnels with a background system accessible via a gateway implementing NAT
US20030229501A1 (en)*2002-06-032003-12-11Copeland Bruce WayneSystems and methods for efficient policy distribution
US20030236865A1 (en)*2002-06-202003-12-25Microsoft CorporationMethod and system for configuring remote access to a server
US7450438B1 (en)2002-06-202008-11-11Cisco Technology, Inc.Crossbar apparatus for a forwarding table memory in a router
US7710991B1 (en)2002-06-202010-05-04Cisco Technology, Inc.Scalable packet routing and switching device and method
US7525904B1 (en)2002-06-202009-04-28Cisco Technology, Inc.Redundant packet routing and switching device and method
US20030236887A1 (en)*2002-06-212003-12-25Check Point Software Technologies Ltd.Cluster bandwidth management algorithms
US20040090613A1 (en)*2002-07-172004-05-13Goix Philippe J.Method for measuring the volume of cells or particles
US6981174B1 (en)*2002-07-182005-12-27Extreme Networks, Inc.Method and apparatus for a redundant port
AU2003260071A1 (en)2002-08-272004-03-19Td Security, Inc., Dba Trust Digital, LlcEnterprise-wide security system for computer devices
US7231664B2 (en)2002-09-042007-06-12Secure Computing CorporationSystem and method for transmitting and receiving secure data in a virtual private group
US7512810B1 (en)2002-09-112009-03-31Guardian Data Storage LlcMethod and system for protecting encrypted files transmitted over a network
WO2004025904A2 (en)*2002-09-132004-03-25Nortel Networks LimitedGeneralized layer-2 vpns
US7448067B2 (en)*2002-09-302008-11-04Intel CorporationMethod and apparatus for enforcing network security policies
JP4400059B2 (en)*2002-10-172010-01-20株式会社日立製作所 Policy setting support tool
US7308706B2 (en)*2002-10-282007-12-11Secure Computing CorporationAssociative policy model
US7836310B1 (en)2002-11-012010-11-16Yevgeniy GutnikSecurity system that uses indirect password-based encryption
US7796752B2 (en)*2002-11-042010-09-14Marvell International Ltd.Cipher implementation
US7827272B2 (en)*2002-11-042010-11-02Riverbed Technology, Inc.Connection table for intrusion detection
US20040098483A1 (en)*2002-11-142004-05-20Engel Glenn R.Triggering communication from devices that self-initiate communication
US20040111513A1 (en)*2002-12-042004-06-10Shen Simon S.Automatic employment of resource load information with one or more policies to automatically determine whether to decrease one or more loads
US7743158B2 (en)*2002-12-042010-06-22Ntt Docomo, Inc.Access network dynamic firewall
GB0228370D0 (en)*2002-12-052003-01-08Bts Holdings LtdSystem and method for acquisition, storage and delivery of communications usage data from communications resources
US7890990B1 (en)2002-12-202011-02-15Klimenty VainsteinSecurity system with staging capabilities
US7536476B1 (en)*2002-12-202009-05-19Cisco Technology, Inc.Method for performing tree based ACL lookups
US7577838B1 (en)2002-12-202009-08-18Alain RossmannHybrid systems for securing digital assets
JP2004222009A (en)2003-01-162004-08-05Nec Corp Heterogeneous network connection gateway and heterogeneous network communication billing system
US7778999B1 (en)2003-01-242010-08-17Bsecure Technologies, Inc.Systems and methods for multi-layered packet filtering and remote management of network devices
US7567510B2 (en)2003-02-132009-07-28Cisco Technology, Inc.Security groups
US7437441B1 (en)*2003-02-282008-10-14Microsoft CorporationUsing deltas for efficient policy distribution
US7072807B2 (en)2003-03-062006-07-04Microsoft CorporationArchitecture for distributed computing system and automated design, deployment, and management of distributed applications
US8122106B2 (en)*2003-03-062012-02-21Microsoft CorporationIntegrating design, deployment, and management phases for systems
US7689676B2 (en)2003-03-062010-03-30Microsoft CorporationModel-based policy application
US7890543B2 (en)2003-03-062011-02-15Microsoft CorporationArchitecture for distributed computing system and automated design, deployment, and management of distributed applications
US10063523B2 (en)2005-09-142018-08-28Oracle International CorporationCrafted identities
US10275723B2 (en)2005-09-142019-04-30Oracle International CorporationPolicy enforcement via attestations
US9781154B1 (en)2003-04-012017-10-03Oracle International CorporationSystems and methods for supporting information security and sub-system operational protocol conformance
US9003048B2 (en)*2003-04-012015-04-07Microsoft Technology Licensing, LlcNetwork zones
US20040225657A1 (en)*2003-05-072004-11-11Panacea CorporationWeb services method and system
US20040225656A1 (en)*2003-05-072004-11-11Panacea CorporationWeb services method and system
WO2004102334A2 (en)*2003-05-072004-11-25Panacea CorporationWeb services method and system
US20040225717A1 (en)*2003-05-092004-11-11AlcatelNetwork architecture for message based policy distribution
EP1629623A4 (en)*2003-05-302010-12-08Calyptix SecuritySystems and methods for dynamic and risk-aware network security
US8707034B1 (en)2003-05-302014-04-22Intellectual Ventures I LlcMethod and system for using remote headers to secure electronic files
JP4101839B2 (en)*2003-06-192008-06-18日本電信電話株式会社 Session control server and communication system
US7636917B2 (en)*2003-06-302009-12-22Microsoft CorporationNetwork load balancing with host status information
US7606929B2 (en)*2003-06-302009-10-20Microsoft CorporationNetwork load balancing with connection manipulation
US7613822B2 (en)2003-06-302009-11-03Microsoft CorporationNetwork load balancing with session information
US7567504B2 (en)2003-06-302009-07-28Microsoft CorporationNetwork load balancing with traffic routing
US7590736B2 (en)*2003-06-302009-09-15Microsoft CorporationFlexible network load balancing
US7730543B1 (en)2003-06-302010-06-01Satyajit NathMethod and system for enabling users of a group shared across multiple file security systems to access secured files
US7555558B1 (en)2003-08-152009-06-30Michael Frederick KenrichMethod and system for fault-tolerant transfer of files across a network
US7889644B2 (en)*2003-08-212011-02-15Alcatel LucentMulti-time scale adaptive internet protocol routing system and method
CN100341285C (en)*2003-08-302007-10-03华为技术有限公司Safety journal realizing method
US7751416B2 (en)*2003-09-182010-07-06Cisco Technology, Inc.Virtual network device
US7178052B2 (en)2003-09-182007-02-13Cisco Technology, Inc.High availability virtual switch
US7523484B2 (en)*2003-09-242009-04-21Infoexpress, Inc.Systems and methods of controlling network access
US8127366B2 (en)2003-09-302012-02-28Guardian Data Storage, LlcMethod and apparatus for transitioning between states of security policies used to secure electronic documents
US7703140B2 (en)2003-09-302010-04-20Guardian Data Storage, LlcMethod and system for securing digital assets using process-driven security policies
US7668923B2 (en)*2003-10-142010-02-23International Business Machines CorporationMaster-slave adapter
US20050086531A1 (en)*2003-10-202005-04-21Pss Systems, Inc.Method and system for proxy approval of security changes for a file security system
US8146148B2 (en)2003-11-192012-03-27Cisco Technology, Inc.Tunneled security groups
US7430760B2 (en)2003-12-052008-09-30Microsoft CorporationSecurity-related programming interface
CN100518166C (en)*2003-12-162009-07-22鸿富锦精密工业(深圳)有限公司 Information Security Passport Generation and Issuance System and Method
US20050138371A1 (en)*2003-12-192005-06-23Pss Systems, Inc.Method and system for distribution of notifications in file security systems
US20050138416A1 (en)*2003-12-192005-06-23Microsoft CorporationObject model for managing firewall services
US7730137B1 (en)2003-12-222010-06-01Aol Inc.Restricting the volume of outbound electronic messages originated by a single entity
WO2005064498A1 (en)*2003-12-232005-07-14Trust Digital, LlcSystem and method for enforcing a security policy on mobile devices using dynamically generated security profiles
US7548956B1 (en)*2003-12-302009-06-16Aol LlcSpam control based on sender account characteristics
WO2005067260A1 (en)*2003-12-312005-07-21Applied IdentityMethod and system for delegating access to computer network resources
JP4265413B2 (en)2004-01-192009-05-20日本電気株式会社 Policy enforcement system and method for virtual private organization
EP1723550A4 (en)*2004-01-302008-07-16IbmHierarchical resource management for a computing utility
US8990430B2 (en)2004-02-192015-03-24Cisco Technology, Inc.Interface bundles in virtual network devices
US7778422B2 (en)2004-02-272010-08-17Microsoft CorporationSecurity associations for devices
FR2868230B1 (en)*2004-03-252012-06-08Netasq DEVICE AND METHOD FOR DETECTING AND PREVENTING INTRUSION IN A COMPUTER NETWORK
US7539862B2 (en)*2004-04-082009-05-26Ipass Inc.Method and system for verifying and updating the configuration of an access device during authentication
US7889733B2 (en)2004-04-282011-02-15Cisco Technology, Inc.Intelligent adjunct network device
US20050246529A1 (en)2004-04-302005-11-03Microsoft CorporationIsolated persistent identity storage for authentication of computing devies
US7706364B2 (en)2004-05-192010-04-27Cisco Technology, Inc.Virtual network device clusters
US7710957B2 (en)2004-05-192010-05-04Cisco Technology, Inc.System and method for implementing multiple spanning trees per network
US20050267961A1 (en)*2004-05-272005-12-01Pirbhai Rahim SCommunication network management methods and systems
US20050276234A1 (en)*2004-06-092005-12-15Yemeng FengMethod and architecture for efficiently delivering conferencing data in a distributed multipoint communication system
WO2006012058A1 (en)*2004-06-282006-02-02Japan Communications, Inc.Systems and methods for mutual authentication of network
US7725716B2 (en)2004-06-282010-05-25Japan Communications, Inc.Methods and systems for encrypting, transmitting, and storing electronic information and files
US7808983B2 (en)2004-07-082010-10-05Cisco Technology, Inc.Network device architecture for centralized packet processing
US7617501B2 (en)*2004-07-092009-11-10Quest Software, Inc.Apparatus, system, and method for managing policies on a computer having a foreign operating system
US7707427B1 (en)2004-07-192010-04-27Michael Frederick KenrichMulti-level file digests
US20060026216A1 (en)*2004-07-302006-02-02Mirra, Inc.Server-assited communication among clients
US8146145B2 (en)*2004-09-302012-03-27Rockstar Bidco LpMethod and apparatus for enabling enhanced control of traffic propagation through a network firewall
US7543069B2 (en)*2004-10-182009-06-02International Business Machines CorporationDynamically updating session state affinity
US7779368B2 (en)*2004-10-302010-08-17Hewlett-Packard Development Company, L.P.Systems and methods for presenting managed data
US7509493B2 (en)*2004-11-192009-03-24Microsoft CorporationMethod and system for distributing security policies
US7715429B2 (en)*2004-12-062010-05-11Hewlett-Packard Development Company, L.P.Interconnect system for supply chain management of virtual private network services
US7626940B2 (en)*2004-12-222009-12-01Intruguard Devices, Inc.System and method for integrated header, state, rate and content anomaly prevention for domain name service
US7889712B2 (en)2004-12-232011-02-15Cisco Technology, Inc.Methods and apparatus for providing loop free routing tables
FI20041702A0 (en)*2004-12-312004-12-31Nokia Corp Service buffering for process control
EP1691284A1 (en)*2005-02-112006-08-16Comptel CorporationMethod, system and computer program product for providing access policies for services
WO2006093917A2 (en)*2005-02-282006-09-08Trust DigitalMobile data security system and methods
CN100411350C (en)*2005-03-012008-08-13联想(北京)有限公司Mixed policy loading system and method for realizing policy management
EP1858204A4 (en)*2005-03-112014-01-08Fujitsu Ltd ACCESS CONTROL METHOD, ACCESS CONTROL SYSTEM, AND PACKET COMMUNICATION APPARATUS
CN100399747C (en)*2005-03-172008-07-02联想(北京)有限公司Computer network strategy management system and strategy management method
US7792860B2 (en)*2005-03-252010-09-07Oracle International CorporationSystem for change notification and persistent caching of dynamically computed membership of rules-based lists in LDAP
US7877780B2 (en)*2005-04-012011-01-25Parasoft CorporationSystem and method for enforcing functionality in computer software through policies
US20060235664A1 (en)*2005-04-152006-10-19Microsoft CorporationModel-based capacity planning
US7797147B2 (en)2005-04-152010-09-14Microsoft CorporationModel-based system monitoring
US7802144B2 (en)*2005-04-152010-09-21Microsoft CorporationModel-based system monitoring
US8489728B2 (en)*2005-04-152013-07-16Microsoft CorporationModel-based system monitoring
ES2305938T3 (en)*2005-04-222008-11-01Trumpf Laser Gmbh + Co. Kg SYSTEM AND PROCEDURE FOR SECURE REMOTE ACCESS.
US7668969B1 (en)*2005-04-272010-02-23Extreme Networks, Inc.Rule structure for performing network switch functions
US7860006B1 (en)*2005-04-272010-12-28Extreme Networks, Inc.Integrated methods of performing network switch functions
US7895308B2 (en)*2005-05-112011-02-22Tindall Steven JMessaging system configurator
US7793333B2 (en)*2005-06-132010-09-07International Business Machines CorporationMobile authorization using policy based access control
US20060282878A1 (en)*2005-06-142006-12-14Stanley James CExpression of packet processing policies using file processing rules
US8549513B2 (en)2005-06-292013-10-01Microsoft CorporationModel-based virtual system provisioning
US20070005320A1 (en)*2005-06-292007-01-04Microsoft CorporationModel-based configuration management
US20070016393A1 (en)*2005-06-292007-01-18Microsoft CorporationModel-based propagation of attributes
US10733666B1 (en)2005-06-302020-08-04Sun Microsystems Inc.System and method for defining a privacy zone within a network
CN100461690C (en)*2005-07-212009-02-11华为技术有限公司 General Network Management Security Management System and Method
US7774822B2 (en)*2005-08-032010-08-10Novell, Inc.Autonomous policy discovery
US8230491B2 (en)*2005-08-192012-07-24Opnet Technologies, Inc.Automatic access to network devices using various authentication schemes
US7590733B2 (en)*2005-09-142009-09-15Infoexpress, Inc.Dynamic address assignment for access control on DHCP networks
US20070058612A1 (en)*2005-09-142007-03-15Matsushita Electric Industrial Co., Ltd.Quality of service enabled device and method of operation therefore for use with universal plug and play
US8151321B2 (en)*2005-10-132012-04-03Nokia CorporationModular network-assisted policy resolution
US7437755B2 (en)*2005-10-262008-10-14Cisco Technology, Inc.Unified network and physical premises access control server
CN100352211C (en)*2005-11-012007-11-28华为技术有限公司 Method and system for updating policy information in wireless local area network
US7941309B2 (en)2005-11-022011-05-10Microsoft CorporationModeling IT operations/policies
JP4892937B2 (en)*2005-11-162012-03-07日本電気株式会社 COMMUNICATION SYSTEM, ACCESS LIMIT METHOD, ACCESS LIMIT DEVICE, PROGRAM
US7904949B2 (en)2005-12-192011-03-08Quest Software, Inc.Apparatus, systems and methods to provide authentication services to a legacy application
US8087075B2 (en)2006-02-132011-12-27Quest Software, Inc.Disconnected credential validation using pre-fetched service tickets
US20070192500A1 (en)*2006-02-162007-08-16Infoexpress, Inc.Network access control including dynamic policy enforcement point
US20070192858A1 (en)*2006-02-162007-08-16Infoexpress, Inc.Peer based network access control
JP4791850B2 (en)*2006-02-232011-10-12株式会社日立製作所 Information processing system and virtual office system
US8533338B2 (en)2006-03-212013-09-10Japan Communications, Inc.Systems and methods for providing secure communications for transactions
US7703126B2 (en)*2006-03-312010-04-20Intel CorporationHierarchical trust based posture reporting and policy enforcement
US8122492B2 (en)*2006-04-212012-02-21Microsoft CorporationIntegration of social network information and network firewalls
US8079073B2 (en)*2006-05-052011-12-13Microsoft CorporationDistributed firewall implementation and control
US8176157B2 (en)*2006-05-182012-05-08Microsoft CorporationExceptions grouping
US8726020B2 (en)*2006-05-312014-05-13Microsoft CorporationUpdating configuration information to a perimeter network
US8429712B2 (en)2006-06-082013-04-23Quest Software, Inc.Centralized user authentication system apparatus and method
CN100461719C (en)*2006-06-152009-02-11华为技术有限公司 Service health detection system and method
US20080034080A1 (en)*2006-08-022008-02-07Nokia Siemens Networks Gmbh & CoPolicy translator - policy control in convergent networks
US20080059619A1 (en)*2006-08-312008-03-06Microsoft CorporationConfiguring a Perimeter Network
US7584282B2 (en)*2006-09-302009-09-01Dell Products L.P.Object-based service oriented architecture method, apparatus and media
US8259568B2 (en)2006-10-232012-09-04Mcafee, Inc.System and method for controlling mobile device access to a network
US8086710B2 (en)2006-10-302011-12-27Quest Software, Inc.Identity migration apparatus and method
WO2008058570A1 (en)*2006-11-142008-05-22Telefonaktiebolaget L M Ericsson (Publ)A system and a method relating to network management
CN101197694B (en)*2006-12-042011-05-11中兴通讯股份有限公司Central statistics and processing system and method for communication system log
US8391168B2 (en)*2007-03-142013-03-05Cisco Technology, Inc.Automatically discovering architectural roles of packet switching devices
US8301772B2 (en)*2007-03-272012-10-30Symantec CorporationMethod and apparatus for allocating resources among backup tasks in a data backup system
US20080288622A1 (en)*2007-05-182008-11-20Microsoft CorporationManaging Server Farms
US8144591B2 (en)*2007-07-052012-03-27Cisco Technology, Inc.System and method for reducing latency in call setup and teardown
US8359646B2 (en)*2007-07-122013-01-22International Business Machines CorporationEnsuring security of connection between thin client and client blade
US7954145B2 (en)*2007-09-272011-05-31Novell, Inc.Dynamically configuring a client for virtual private network (VPN) access
US7971231B2 (en)*2007-10-022011-06-28International Business Machines CorporationConfiguration management database (CMDB) which establishes policy artifacts and automatic tagging of the same
CN101483847B (en)*2008-01-072012-10-03华为技术有限公司Method, apparatus and system for implementing policy control
US7817636B2 (en)2008-01-302010-10-19Cisco Technology, Inc.Obtaining information on forwarding decisions for a packet flow
FR2928062B1 (en)2008-02-262010-02-26Thales Sa METHOD OF MANAGEMENT IN SECURITY EQUIPMENT AND ENTITY OF SECURITY
US8806037B1 (en)2008-02-292014-08-12Netapp, Inc.Remote support automation for a storage server
WO2009109803A1 (en)*2008-03-042009-09-11Bridgewater Systems Corp.Providing dynamic quality of service for virtual private networks
US7852849B2 (en)2008-03-042010-12-14Bridgewater Systems Corp.Providing dynamic quality of service for virtual private networks
JP5087441B2 (en)*2008-03-192012-12-05矢崎総業株式会社 Power supply
US8135838B2 (en)*2008-04-082012-03-13Geminare IncorporatedSystem and method for providing data and application continuity in a computer system
FR2932048A1 (en)*2008-05-272009-12-04France Telecom METHOD AND SYSTEM FOR USER ACCESS TO AT LEAST ONE SERVICE PROVIDED BY AT LEAST ONE OTHER USER
JP5237034B2 (en)2008-09-302013-07-17株式会社日立製作所 Root cause analysis method, device, and program for IT devices that do not acquire event information.
EP2180401A1 (en)2008-10-242010-04-28Thomson Telecom BelgiumA method at a gateway for selecting and managing a default disk
US8086909B1 (en)*2008-11-052011-12-27Network Appliance, Inc.Automatic core file upload
EP2345205B1 (en)*2008-11-062016-04-27McAfee, Inc.Apparatus and method for mediating connections between policy source servers, corporate repositories, and mobile devices
JP2010128824A (en)*2008-11-272010-06-10Hitachi Software Eng Co LtdClient control system utilizing policy group identifier
US20100138893A1 (en)*2008-12-022010-06-03Inventec CorporationProcessing method for accelerating packet filtering
US20100318642A1 (en)*2009-03-052010-12-16Linda DozierSystem and method for managing and monitoring electronic communications
US20100250293A1 (en)*2009-03-252010-09-30International Business Machines CorporationSoa policy versioning
US8055775B2 (en)*2009-03-252011-11-08International Business Machines CorporationSOA policy engine framework
US8284699B1 (en)*2009-04-302012-10-09Palo Alto Networks, Inc.Managing network devices
US8108495B1 (en)2009-04-302012-01-31Palo Alto Networks, Inc.Managing network devices
CN101552695B (en)*2009-05-062011-07-13中兴通讯股份有限公司A unified network management method and system for multi-disciplinary networks
JP5234807B2 (en)*2009-05-132013-07-10Necインフロンティア株式会社 Network device and automatic encryption communication method used therefor
US7866269B2 (en)*2009-06-082011-01-11Cnh Canada, Ltd.Method and apparatus for regulating air flow through supply conduits through which product entrained in an air flow is provided to multiple on-row product containers of an agricultural implement
US20100332530A1 (en)*2009-06-262010-12-30Microsoft CorporationIslands of data
US8255984B1 (en)2009-07-012012-08-28Quest Software, Inc.Single sign-on system for shared resource environments
US8909916B2 (en)*2009-11-302014-12-09Red Hat, Inc.Using a PKCS module for opening multiple databases
US8775352B2 (en)*2010-03-012014-07-08At&T Intellectual Property I, L.P.Methods and apparatus to model end-to-end class of service policies in networks
CN101833620A (en)*2010-04-282010-09-15国网电力科学研究院 A database protection method based on self-defined security JDBC driver
US8935384B2 (en)2010-05-062015-01-13Mcafee Inc.Distributed data revocation using data commands
US20110282981A1 (en)*2010-05-112011-11-17Alcatel-Lucent Canada Inc.Behavioral rule results
CN102244649B (en)*2010-05-122015-06-10杭州华三通信技术有限公司Data transmission method among secure networks and data processors
US8856300B2 (en)*2010-05-182014-10-07At&T Intellectual Property I, L.P.End-to-end secure cloud computing
US20110289119A1 (en)*2010-05-202011-11-24Sybase, Inc.Methods and systems for monitoring server cloud topology and resources
EP2617157B1 (en)2010-09-172018-07-18Oracle International CorporationPerforming partial subnet initialization in a middleware machine environment
US8335841B2 (en)*2010-09-302012-12-18Microsoft CorporationLogical networks
US8880666B2 (en)*2010-10-292014-11-04At&T Intellectual Property I, L.P.Method, policy request router, and machine-readable hardware storage device to select a policy server based on a network condition to receive policy requests for a duration
US8635682B2 (en)2010-11-242014-01-21Oracle International CorporationPropagating security identity information to components of a composite application
US9589145B2 (en)*2010-11-242017-03-07Oracle International CorporationAttaching web service policies to a group of policy subjects
US8650250B2 (en)2010-11-242014-02-11Oracle International CorporationIdentifying compatible web service policies
US9021055B2 (en)2010-11-242015-04-28Oracle International CorporationNonconforming web service policy functions
CN102487377B (en)*2010-12-012017-12-19中铁信息计算机工程有限责任公司A kind of certification and Rights Management System
US8739056B2 (en)*2010-12-142014-05-27Symantec CorporationSystems and methods for displaying a dynamic list of virtual objects when a drag and drop action is detected
US8726348B2 (en)*2010-12-152014-05-13The Boeing CompanyCollaborative rules based security
KR101161103B1 (en)*2010-12-232012-06-28연세대학교 산학협력단Method for tracking user location, method and apparatus for constructing map using the same
US8671186B2 (en)*2011-03-082014-03-11Hitachi, Ltd.Computer system management method and management apparatus
JP5395833B2 (en)*2011-03-142014-01-22株式会社東芝 Virtual network system and virtual communication control method
US8811281B2 (en)2011-04-012014-08-19Cisco Technology, Inc.Soft retention for call admission control in communication networks
US8560819B2 (en)2011-05-312013-10-15Oracle International CorporationSoftware execution using multiple initialization modes
US8713649B2 (en)2011-06-032014-04-29Oracle International CorporationSystem and method for providing restrictions on the location of peer subnet manager (SM) instances in an infiniband (IB) network
EP2716003B1 (en)2011-06-032016-09-28Oracle International CorporationSystem and method for authenticating components in a network
DE102011077218B4 (en)*2011-06-082023-12-14Servicenow, Inc. Access to data stored in a cloud
JP2013038684A (en)*2011-08-102013-02-21Refiner IncVpn connection management system
US8914843B2 (en)2011-09-302014-12-16Oracle International CorporationConflict resolution when identical policies are attached to a single policy subject
US8942088B2 (en)*2011-10-072015-01-27Telefonaktiebolaget L M Ericsson (Publ)BNG to PCRF mediation entity for BBF and 3GPP access interworking
US9680925B2 (en)2012-01-092017-06-13At&T Intellectual Property I, L. P.Methods and apparatus to route message traffic using tiered affinity-based message routing
US9009302B2 (en)*2012-02-212015-04-14Cisco Technology, Inc.Dynamic group creation and traffic flow registration under a group in a group key infrastructure
US10432587B2 (en)*2012-02-212019-10-01Aventail LlcVPN deep packet inspection
US9501849B2 (en)*2012-05-112016-11-22Vmware, Inc.Multi-dimensional visualization tool for browsing and troubleshooting at scale
US9401963B2 (en)2012-06-042016-07-26Oracle International CorporationSystem and method for supporting reliable connection (RC) based subnet administrator (SA) access in an engineered system for middleware and application execution
US8990375B2 (en)*2012-08-312015-03-24Facebook, Inc.Subscription groups in publish-subscribe system
US9130926B2 (en)*2012-12-272015-09-08Microsoft Technology Licensing, LlcAuthorization messaging with integral delegation data
US9189510B2 (en)2013-02-262015-11-17Facebook, Inc.System and method for implementing cache consistent regional clusters
US9426154B2 (en)2013-03-142016-08-23Amazon Technologies, Inc.Providing devices as a service
US9882919B2 (en)2013-04-102018-01-30Illumio, Inc.Distributed network security using a logical multi-dimensional label-based policy model
JP6069580B2 (en)*2013-04-102017-02-01イルミオ, インコーポレイテッドIllumio,Inc. Distributed network management using a logical multidimensional label-based policy model
US9716728B1 (en)*2013-05-072017-07-25Vormetric, Inc.Instant data security in untrusted environments
US10749711B2 (en)2013-07-102020-08-18Nicira, Inc.Network-link method useful for a last-mile connectivity in an edge-gateway multipath system
US10581687B2 (en)2013-09-262020-03-03Appformix Inc.Real-time cloud-infrastructure policy implementation and management
US10355997B2 (en)2013-09-262019-07-16Appformix Inc.System and method for improving TCP performance in virtualized environments
US10291472B2 (en)2015-07-292019-05-14AppFormix, Inc.Assessment of operational states of a computing environment
CN105900059B (en)2014-01-212019-06-07甲骨文国际公司System and method for supporting multi-tenant in application server, cloud or other environment
US10277559B2 (en)*2014-05-212019-04-30Excalibur Ip, LlcMethods and systems for data traffic control and encryption
JP6748638B2 (en)2014-09-242020-09-02オラクル・インターナショナル・コーポレイション System and method for supporting patching in a multi-tenant application server environment
US10318280B2 (en)2014-09-242019-06-11Oracle International CorporationSystem and method for supporting patching in a multitenant application server environment
KR101637198B1 (en)*2014-11-042016-07-07홍익대학교 산학협력단Method for classifying human mobility state using particle filter
US10250512B2 (en)2015-01-212019-04-02Oracle International CorporationSystem and method for traffic director support in a multitenant application server environment
US10178184B2 (en)2015-01-212019-01-08Oracle International CorporationSystem and method for session handling in a multitenant application server environment
US10135789B2 (en)2015-04-132018-11-20Nicira, Inc.Method and system of establishing a virtual private network in a cloud service for branch networking
US10498652B2 (en)2015-04-132019-12-03Nicira, Inc.Method and system of application-aware routing with crowdsourcing
US9948679B2 (en)*2015-08-212018-04-17Cisco Technology, Inc.Object-relation user interface for viewing security configurations of network security devices
US10257019B2 (en)*2015-12-042019-04-09Arista Networks, Inc.Link aggregation split-brain detection and recovery
US9973528B2 (en)2015-12-212018-05-15Fortinet, Inc.Two-stage hash based logic for application layer distributed denial of service (DDoS) attack attribution
CN105546190A (en)*2016-01-082016-05-04西安正昌电子股份有限公司Dual-electric-control pilot memory valve body device with adjustable air pressure
US10182055B2 (en)2016-06-062019-01-15Cisco Technology, Inc.Security policy efficacy visualization
RU2724639C2 (en)*2016-06-242020-06-25Акционерное общество "Лаборатория Касперского"Method of binding an unregistered device control agent with a user
US10237240B2 (en)2016-07-212019-03-19AT&T Global Network Services (U.K.) B.V.Assessing risk associated with firewall rules
US10452387B2 (en)2016-09-162019-10-22Oracle International CorporationSystem and method for partition-scoped patching in an application server environment
US10310841B2 (en)2016-09-162019-06-04Oracle International CorporationSystem and method for handling lazy deserialization exceptions in an application server environment
US11706127B2 (en)2017-01-312023-07-18Vmware, Inc.High performance software-defined core network
US20180219765A1 (en)2017-01-312018-08-02Waltz NetworksMethod and Apparatus for Network Traffic Control Optimization
US10778528B2 (en)2017-02-112020-09-15Nicira, Inc.Method and system of connecting to a multipath hub in a cluster
US10868742B2 (en)2017-03-292020-12-15Juniper Networks, Inc.Multi-cluster dashboard for distributed virtualization infrastructure element monitoring and policy control
US11068314B2 (en)2017-03-292021-07-20Juniper Networks, Inc.Micro-level monitoring, visibility and control of shared resources internal to a processor of a host machine for a virtual environment
US11323327B1 (en)2017-04-192022-05-03Juniper Networks, Inc.Virtualization infrastructure element monitoring and policy control in a cloud environment using profiles
CN108809680B (en)*2017-05-042021-03-02腾讯科技(深圳)有限公司Equipment management method and equipment
US10887130B2 (en)2017-06-152021-01-05At&T Intellectual Property I, L.P.Dynamic intelligent analytics VPN instantiation and/or aggregation employing secured access to the cloud network device
US10523539B2 (en)2017-06-222019-12-31Nicira, Inc.Method and system of resiliency in cloud-delivered SD-WAN
US11663084B2 (en)*2017-08-082023-05-30Rubrik, Inc.Auto-upgrade of remote data management connectors
US10536383B2 (en)*2017-09-192020-01-14Nicira, Inc.Attribute enhancement for handling network packet traffic between micro segmented guests
US20190089592A1 (en)*2017-09-202019-03-21Quanta Computer Inc.Role-based automatic configuration system and method for ethernet switches
US11223514B2 (en)2017-11-092022-01-11Nicira, Inc.Method and system of a dynamic high-availability mode based on current wide area network connectivity
GB2572982C (en)*2018-04-182021-01-20Gurulogic Microsystems OySystem and method for creating group networks between network devices
EP3968569B1 (en)*2018-06-082022-10-05Secucloud GmbHLinearly scalable network security architecture
JP7188046B2 (en)*2018-12-142022-12-13富士フイルムビジネスイノベーション株式会社 Communication system, communication device, communication system program and communication program
US11489783B2 (en)2019-12-122022-11-01Vmware, Inc.Performing deep packet inspection in a software defined wide area network
US11245641B2 (en)2020-07-022022-02-08Vmware, Inc.Methods and apparatus for application aware hub clustering techniques for a hyper scale SD-WAN
US11316823B2 (en)2020-08-272022-04-26Centripetal Networks, Inc.Methods and systems for efficient virtualization of inline transparent computer networking devices
US11575600B2 (en)2020-11-242023-02-07Vmware, Inc.Tunnel-less SD-WAN
US12218845B2 (en)2021-01-182025-02-04VMware LLCNetwork-aware load balancing
US11729065B2 (en)2021-05-062023-08-15Vmware, Inc.Methods for application defined virtual network service among multiple transport in SD-WAN
US12015536B2 (en)2021-06-182024-06-18VMware LLCMethod and apparatus for deploying tenant deployable elements across public clouds based on harvested performance metrics of types of resource elements in the public clouds
US12250114B2 (en)2021-06-182025-03-11VMware LLCMethod and apparatus for deploying tenant deployable elements across public clouds based on harvested performance metrics of sub-types of resource elements in the public clouds
US12155627B2 (en)2021-09-302024-11-26Acronis International GmbhManaging corporate firewalls and network isolation for EDR
US11943146B2 (en)2021-10-012024-03-26VMware LLCTraffic prioritization in SD-WAN
CN114461997A (en)*2021-12-272022-05-10北京升明科技有限公司Strategy allocation method and device, electronic equipment and storage medium
CN114363211B (en)*2022-01-042024-11-26中国建设银行股份有限公司 A network connectivity verification method and related equipment for a disaster recovery system network
US12184557B2 (en)2022-01-042024-12-31VMware LLCExplicit congestion notification in a virtual environment
US12425395B2 (en)2022-01-152025-09-23VMware LLCMethod and system of securely adding an edge device operating in a public network to an SD-WAN
US11909815B2 (en)2022-06-062024-02-20VMware LLCRouting based on geolocation costs
JP7573692B1 (en)2023-06-192024-10-25三菱電機株式会社 Master device, communication control method, communication control program, and communication control system
JP7573693B1 (en)2023-06-192024-10-25三菱電機株式会社 Edge device, communication control method, communication control program, and communication control system
US12261777B2 (en)2023-08-162025-03-25VMware LLCForwarding packets in multi-regional large scale deployments with distributed gateways
US12355655B2 (en)2023-08-162025-07-08VMware LLCForwarding packets in multi-regional large scale deployments with distributed gateways

Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5758083A (en)*1995-10-301998-05-26Sun Microsystems, Inc.Method and system for sharing information between network managers
US5884325A (en)*1996-10-091999-03-16Oracle CorporationSystem for synchronizing shared data between computers
US6210272B1 (en)*1997-12-222001-04-03Health Hero Network, Inc.Multi-player interactive electronic game for health education
US6404884B1 (en)*1999-10-082002-06-11Grape Technology Group, Inc.Personalized assistance system and method
US6408282B1 (en)*1999-03-012002-06-18Wit Capital Corp.System and method for conducting securities transactions over a computer network
US6466941B1 (en)*1997-03-172002-10-15British Telecommunications Public Limited CompanyContent management tool and service table database with unique service entries each associated with a set of record tables with record entries including links to shared record entries in other tables
US6516314B1 (en)*1998-11-172003-02-04Telefonaktiebolaget L M Ericsson (Publ)Optimization of change log handling
US6549902B1 (en)*1999-06-172003-04-15Sharp Kabushiki KaishaDatabase managing device

Family Cites Families (47)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5029206A (en)1989-12-271991-07-02Motorola, Inc.Uniform interface for cryptographic services
WO1993011480A1 (en)1991-11-271993-06-10Intergraph CorporationSystem and method for network license administration
JPH0721135A (en)1993-07-021995-01-24Fujitsu Ltd Data processing system with redundant monitoring function
JPH07121394A (en)*1993-10-261995-05-12Fujitsu Ltd Multiplexer
US5473599A (en)1994-04-221995-12-05Cisco Systems, IncorporatedStandby router protocol
US5621727A (en)1994-09-161997-04-15Octel Communications CorporationSystem and method for private addressing plans using community addressing
US5677905A (en)1995-03-281997-10-14Bell Atlantic Network Services, Inc.Access subnetwork controller for video dial tone networks
AU6678096A (en)*1995-07-201997-02-18Novell, Inc.Transaction synchronization in a disconnectable computer and network
JP3441264B2 (en)*1995-09-262003-08-25三菱電機株式会社 Multi-system
US5951639A (en)1996-02-141999-09-14Powertv, Inc.Multicast downloading of software and data modules and their compatibility requirements
US6088451A (en)1996-06-282000-07-11Mci Communications CorporationSecurity system and method for network element access
US5835481A (en)1996-08-281998-11-10Akyol; Cihangir M.Fault tolerant lane system
US5848244A (en)*1996-12-201998-12-08Mci Communications CorporationSystem and method for time-based real-time reconfiguration of a network
US6272648B1 (en)1997-05-132001-08-07Micron Electronics, Inc.System for communicating a software-generated pulse waveform between two servers in a network
US6578077B1 (en)1997-05-272003-06-10Novell, Inc.Traffic monitoring tool for bandwidth management
US6047322A (en)1997-05-272000-04-04Ukiah Software, Inc.Method and apparatus for quality of service management
US6070243A (en)1997-06-132000-05-30Xylan CorporationDeterministic user authentication service for communication network
US5987376A (en)1997-07-161999-11-16Microsoft CorporationSystem and method for the distribution and synchronization of data and state information between clients in a distributed processing system
US5987508A (en)*1997-08-131999-11-16At&T CorpMethod of providing seamless cross-service connectivity in telecommunications network
US6104700A (en)1997-08-292000-08-15Extreme NetworksPolicy based quality of service
US7143438B1 (en)*1997-09-122006-11-28Lucent Technologies Inc.Methods and apparatus for a computer network firewall with multiple domain support
US6148410A (en)1997-09-152000-11-14International Business Machines CorporationFault tolerant recoverable TCP/IP connection router
US6128296A (en)1997-10-032000-10-03Cisco Technology, Inc.Method and apparatus for distributed packet switching using distributed address tables
US6363498B1 (en)*1997-11-202002-03-26Lucent Technologies, Inc.Method and apparatus to automatically back up switching system files
JPH11259383A (en)*1998-03-121999-09-24Hitachi Ltd RAS information acquisition circuit and information processing system having the same
US6148336A (en)1998-03-132000-11-14Deterministic Networks, Inc.Ordering of multiple plugin applications using extensible layered service provider with network traffic filtering
US6141686A (en)1998-03-132000-10-31Deterministic Networks, Inc.Client-side application-classifier gathering network-traffic statistics and application and user names using extensible-service provider plugin for policy-based network control
US6101541A (en)1998-04-212000-08-08International Business Machines CorporationActive polling by network LDAP directory
US6073175A (en)1998-04-272000-06-06International Business Machines CorporationMethod for supporting different service levels in a network using web page content information
US6157955A (en)1998-06-152000-12-05Intel CorporationPacket processing system including a policy engine having a classification unit
US6170009B1 (en)1998-07-172001-01-02Kallol MandalControlling devices on a network through policies
US6529499B1 (en)*1998-09-222003-03-04Lucent Technologies Inc.Method for providing quality of service for delay sensitive traffic over IP networks
US6243749B1 (en)1998-10-082001-06-05Cisco Technology, Inc.Dynamic network address updating
US6311205B1 (en)1998-10-192001-10-30International Business Machines CorporationPersistent user groups on servers managed by central servers
US6286052B1 (en)1998-12-042001-09-04Cisco Technology, Inc.Method and apparatus for identifying network data traffic flows and for applying quality of service treatments to the flows
US6167445A (en)1998-10-262000-12-26Cisco Technology, Inc.Method and apparatus for defining and implementing high-level quality of service policies in computer networks
US6158010A (en)*1998-10-282000-12-05Crosslogix, Inc.System and method for maintaining security in a distributed computer network
US6374295B2 (en)1998-10-292002-04-16Nortel Networks LimitedActive server management
CA2292272A1 (en)1998-12-222000-06-22Nortel Networks CorporationSystem and method to support configurable policies for services in directory-based networks
US6449650B1 (en)1999-02-012002-09-10Redback Networks Inc.Methods and apparatus for deploying quality of service policies on a data communication network
US6408399B1 (en)*1999-02-242002-06-18Lucent Technologies Inc.High reliability multiple processing and control system utilizing shared components
US6442713B1 (en)*1999-03-302002-08-27International Business Machines CorporationCluster node distress signal
US6523064B1 (en)1999-04-292003-02-18Mitsubishi Electric Research Laboratories, IncNetwork gateway for collecting geographic data information
US6587466B1 (en)*1999-05-272003-07-01International Business Machines CorporationSearch tree for policy based packet classification in communication networks
US6487594B1 (en)*1999-11-302002-11-26Mediaone Group, Inc.Policy management method and system for internet service providers
US6584454B1 (en)1999-12-312003-06-24Ge Medical Technology Services, Inc.Method and apparatus for community management in remote system servicing
US20030115346A1 (en)*2001-12-132003-06-19Mchenry Stephen T.Multi-proxy network edge cache system and methods

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5758083A (en)*1995-10-301998-05-26Sun Microsystems, Inc.Method and system for sharing information between network managers
US5884325A (en)*1996-10-091999-03-16Oracle CorporationSystem for synchronizing shared data between computers
US6466941B1 (en)*1997-03-172002-10-15British Telecommunications Public Limited CompanyContent management tool and service table database with unique service entries each associated with a set of record tables with record entries including links to shared record entries in other tables
US6210272B1 (en)*1997-12-222001-04-03Health Hero Network, Inc.Multi-player interactive electronic game for health education
US6516314B1 (en)*1998-11-172003-02-04Telefonaktiebolaget L M Ericsson (Publ)Optimization of change log handling
US6408282B1 (en)*1999-03-012002-06-18Wit Capital Corp.System and method for conducting securities transactions over a computer network
US6549902B1 (en)*1999-06-172003-04-15Sharp Kabushiki KaishaDatabase managing device
US6404884B1 (en)*1999-10-082002-06-11Grape Technology Group, Inc.Personalized assistance system and method

Cited By (300)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7293067B1 (en)*1999-07-162007-11-06Canon Kabushiki KaishaSystem for searching device on network
US7886044B2 (en)1999-07-162011-02-08Canon Kabushiki KaishaSystem for searching device on network
US7877492B2 (en)*1999-10-122011-01-25Webmd CorporationSystem and method for delegating a user authentication process for a networked application to an authentication agent
US20040168090A1 (en)*1999-10-122004-08-26Webmd Corp.System and method for delegating a user authentication process for a networked application to an authentication agent
US20040172464A1 (en)*2000-07-282004-09-02Siddhartha NagEnd-to-end service quality for latency-intensive internet protocol (IP) applications in a heterogeneous, multi-vendor environment
US8315275B2 (en)2000-07-282012-11-20Prom Ks Mgmt Limited Liability CompanyEnd-to-end service quality for latency-intensive internet protocol (IP) applications in a heterogeneous, multi-vendor environment
US20060020694A1 (en)*2000-07-282006-01-26Prominence Networks, Inc.Administering a communication network
US8032646B2 (en)2000-07-282011-10-04Prom KS Limited Liability CompanyAdministering a communication network
US7774468B1 (en)2000-07-282010-08-10Siddhartha NagNetwork traffic admission control
US20090296734A1 (en)*2000-07-282009-12-03Siddhartha NagEnd-To-End Service Quality for Latency-Intensive Internet Protocol (IP) Applications in a Heterogeneous, Multi-Vendor Environment
US8458332B2 (en)2000-07-282013-06-04Prom Ks Mgmt Limited Liability CompanyMultiplexing several individual application sessions over a pre-allocated reservation protocol session
US7788354B2 (en)2000-07-282010-08-31Siddhartha NagEnd-to-end service quality in a voice over Internet Protocol (VoIP) Network
US8929394B2 (en)2000-07-282015-01-06Prom Ks Mgmt Limited Liability CompanyEnd-to-end service quality for latency-intensive internet protocol (IP) applications in a heterogeneous, multi-vendor environment
US8185640B2 (en)2000-10-112012-05-22Prominence Networks, Inc.Graphical user interface (GUI) for administering a voice over internet protocol (VOIP) network implementing media aggregation
US8918523B2 (en)2000-10-112014-12-23Prom Ks Mgmt Limited Liability CompanyGraphical user interface (GUI) for administering a network implementing media aggregation
US7886054B1 (en)2000-10-112011-02-08Siddhartha NagGraphical user interface (GUI) for administering a network implementing media aggregation
US8862736B2 (en)2000-11-032014-10-14Truphone LimitedCooperative network for mobile internet access
US20100115103A1 (en)*2000-11-032010-05-06Tagg James PCooperative network for mobile internet access
US8935326B2 (en)2000-11-032015-01-13Truphone LimitedCooperative network for mobile internet access
US20100115104A1 (en)*2000-11-032010-05-06Tagg James PCooperative network for mobile internet access
US8996698B1 (en)*2000-11-032015-03-31Truphone LimitedCooperative network for mobile internet access
US20020103783A1 (en)*2000-12-012002-08-01Network Appliance, Inc.Decentralized virus scanning for stored data
US20040230795A1 (en)*2000-12-012004-11-18Armitano Robert M.Policy engine to control the servicing of requests received by a storage server
US7778981B2 (en)*2000-12-012010-08-17Netapp, Inc.Policy engine to control the servicing of requests received by a storage server
US7523487B2 (en)2000-12-012009-04-21Netapp, Inc.Decentralized virus scanning for stored data
US7266683B1 (en)*2001-07-272007-09-04Siddhartha NagSelective encryption of application session packets
US7689722B1 (en)*2002-10-072010-03-30Cisco Technology, Inc.Methods and apparatus for virtual private network fault tolerance
US20060056314A1 (en)*2003-09-182006-03-16Olivier DauresDiscovery of virtual private networks
US8134923B2 (en)*2003-09-182012-03-13Hewlett-Packard Development Company, L.P.Discovery of virtual private networks
US7533407B2 (en)2003-12-162009-05-12Microsoft CorporationSystem and methods for providing network quarantine
US20050267954A1 (en)*2004-04-272005-12-01Microsoft CorporationSystem and methods for providing network quarantine
US9209989B2 (en)2004-06-012015-12-08Inmage Systems, Inc.Causation of a data read operation against a first storage system by a server associated with a second storage system according to a host generated instruction
US9098455B2 (en)2004-06-012015-08-04Inmage Systems, Inc.Systems and methods of event driven recovery management
US20100169452A1 (en)*2004-06-012010-07-01Rajeev AtluriCausation of a data read operation against a first storage system by a server associated with a second storage system according to a host generated instruction
US8055745B2 (en)2004-06-012011-11-08Inmage Systems, Inc.Methods and apparatus for accessing data from a primary data storage system for secondary storage
US20060010227A1 (en)*2004-06-012006-01-12Rajeev AtluriMethods and apparatus for accessing data from a primary data storage system for secondary storage
US8224786B2 (en)2004-06-012012-07-17Inmage Systems, Inc.Acquisition and write validation of data of a networked host node to perform secondary storage
US20060031468A1 (en)*2004-06-012006-02-09Rajeev AtluriSecondary data storage and recovery system
US7979656B2 (en)2004-06-012011-07-12Inmage Systems, Inc.Minimizing configuration changes in a fabric-based data protection solution
US20100169282A1 (en)*2004-06-012010-07-01Rajeev AtluriAcquisition and write validation of data of a networked host node to perform secondary storage
US7698401B2 (en)2004-06-012010-04-13Inmage Systems, IncSecondary data storage and recovery system
US20090313503A1 (en)*2004-06-012009-12-17Rajeev AtluriSystems and methods of event driven recovery management
US8949395B2 (en)2004-06-012015-02-03Inmage Systems, Inc.Systems and methods of event driven recovery management
US20060072589A1 (en)*2004-09-302006-04-06Mandavilli Swamy JMethod and system for managing network nodes which communicate via connectivity services of a service provider
US7643434B2 (en)*2004-09-302010-01-05Hewlett-Packard Development Company, L.P.Method and system for managing network nodes which communicate via connectivity services of a service provider
US20060085850A1 (en)*2004-10-142006-04-20Microsoft CorporationSystem and methods for providing network quarantine using IPsec
US20060184647A1 (en)*2005-02-162006-08-17Dixit Vineet RMethod and apparatus to modify network identifiers at data servers
US7930365B2 (en)*2005-02-162011-04-19Cisco Technology, Inc.Method and apparatus to modify network identifiers at data servers
US20060224719A1 (en)*2005-03-302006-10-05Integrated Informatics, Inc.Operator simulator and non-invasive interface engine
US8428074B2 (en)2005-04-292013-04-23Prom Ks Mgmt Limited Liability CompanyBack-to back H.323 proxy gatekeeper
EP1936529A4 (en)*2005-08-292010-06-23Daikin Ind Ltd FRAUDULENT ACCOUNT DETECTION / REMOVAL DEVICE, INFORMATION COLLECTION DEVICE, AND FRAUDULENT ACCOUNT DETECTION / REMOVAL PROGRAM
US20090281816A1 (en)*2005-08-292009-11-12Daikin Industries, Ltd.Account abuse detection or prevention device, data collection device, and account abuse detection or prevention program
US8036102B2 (en)*2005-09-152011-10-11International Business Machines CorporationProtocol definition for software bridge failover
US20080225700A1 (en)*2005-09-152008-09-18International Business Machines CorporationProtocol Definition for Software Bridge Failover
US8601225B2 (en)2005-09-162013-12-03Inmage Systems, Inc.Time ordered view of backup data on behalf of a host
US20100169587A1 (en)*2005-09-162010-07-01Rajeev AtluriCausation of a data read against a first storage system to optionally store a data write to preserve the version to allow viewing and recovery
US8683144B2 (en)2005-09-162014-03-25Inmage Systems, Inc.Causation of a data read against a first storage system to optionally store a data write to preserve the version to allow viewing and recovery
US20100169591A1 (en)*2005-09-162010-07-01Rajeev AtluriTime ordered view of backup data on behalf of a host
CN100401706C (en)*2005-10-242008-07-09杭州华三通信技术有限公司Access method and system for client end of virtual private network
US7526677B2 (en)2005-10-312009-04-28Microsoft CorporationFragility handling
US7827545B2 (en)2005-12-152010-11-02Microsoft CorporationDynamic remediation of a client computer seeking access to a network with a quarantine enforcement policy
US20070143392A1 (en)*2005-12-152007-06-21Microsoft CorporationDynamic remediation
WO2007072245A3 (en)*2005-12-212007-10-11Koninkl Philips Electronics NvDynamic firewall rule definition
US20070192323A1 (en)*2006-02-102007-08-16Vertical Systems, Inc.System and method of access and control management between multiple databases
US20070198525A1 (en)*2006-02-132007-08-23Microsoft CorporationComputer system with update-based quarantine
US7602737B2 (en)*2006-03-012009-10-13Cisco Technology, Inc.Methods and apparatus for providing an enhanced dynamic multipoint virtual private network architecture
US20070206597A1 (en)*2006-03-012007-09-06Rajiv AsatiMethods and apparatus for providing an enhanced dynamic multipoint virtual private network architecture
US20070234040A1 (en)*2006-03-312007-10-04Microsoft CorporationNetwork access protection
US7793096B2 (en)2006-03-312010-09-07Microsoft CorporationNetwork access protection
US20070244938A1 (en)*2006-04-172007-10-18Microsoft CorporationCreating host-level application-consistent backups of virtual machines
US8321377B2 (en)2006-04-172012-11-27Microsoft CorporationCreating host-level application-consistent backups of virtual machines
US9529807B2 (en)2006-04-172016-12-27Microsoft Technology Licensing, LlcCreating host-level application-consistent backups of virtual machines
US8849760B2 (en)2006-05-022014-09-30International Business Machines CorporationDetermining whether predefined data controlled by a server is replicated to a client machine
US20070260649A1 (en)*2006-05-022007-11-08International Business Machines CorporationDetermining whether predefined data controlled by a server is replicated to a client machine
US20070271428A1 (en)*2006-05-192007-11-22Inmage Systems, Inc.Method and apparatus of continuous data backup and access using virtual machines
US20070271304A1 (en)*2006-05-192007-11-22Inmage Systems, Inc.Method and system of tiered quiescing
US8554727B2 (en)2006-05-192013-10-08Inmage Systems, Inc.Method and system of tiered quiescing
US8868858B2 (en)2006-05-192014-10-21Inmage Systems, Inc.Method and apparatus of continuous data backup and access using virtual machines
US8527470B2 (en)2006-05-222013-09-03Rajeev AtluriRecovery point data view formation with generation of a recovery view and a coalesce policy
US20100169281A1 (en)*2006-05-222010-07-01Rajeev AtluriCoalescing and capturing data between events prior to and after a temporal window
US8838528B2 (en)2006-05-222014-09-16Inmage Systems, Inc.Coalescing and capturing data between events prior to and after a temporal window
US20070282921A1 (en)*2006-05-222007-12-06Inmage Systems, Inc.Recovery point data view shift through a direction-agnostic roll algorithm
US7676502B2 (en)2006-05-222010-03-09Inmage Systems, Inc.Recovery point data view shift through a direction-agnostic roll algorithm
WO2008021075A3 (en)*2006-08-082008-06-26Cipheroptics IncMultiple security groups with common keys on distributed networks
US7634507B2 (en)2006-08-302009-12-15Inmage Systems, Inc.Ensuring data persistence and consistency in enterprise storage backup systems
US20080059542A1 (en)*2006-08-302008-03-06Inmage Systems, Inc.Ensuring data persistence and consistency in enterprise storage backup systems
EP1895712A3 (en)*2006-08-312010-05-26Fujitsu Ltd.System for monitoring the state of apparatuses in a communication network
US20080056160A1 (en)*2006-08-312008-03-06Fujitsu LimitedInformation processing system, information processing apparatus, information processing method and program
US8452876B1 (en)*2006-09-052013-05-28Blue Coat Systems, Inc.Graphical configuration interface for network policy
US20080115218A1 (en)*2006-11-102008-05-15Microsoft CorporationExtensible framework for system security state reporting and remediation
US20110131659A1 (en)*2006-11-102011-06-02Microsoft CorporationExtensible framework for system security state reporting and remediation
US8161560B2 (en)2006-11-102012-04-17Microsoft CorporationExtensible framework for system security state reporting and remediation
US7908659B2 (en)2006-11-102011-03-15Microsoft CorporationExtensible framework for system security state reporting and remediation
US20080123675A1 (en)*2006-11-292008-05-29Fujitsu LimitedData transmission apparatus and data transmission method
US8077616B2 (en)*2006-11-292011-12-13Fujitsu LimitedData transmission apparatus and data transmission method
US20080256029A1 (en)*2007-04-132008-10-16Acei AbPartition management system
US9152664B2 (en)2007-04-132015-10-06Video B Holdings LimitedPartition management system
US20080317048A1 (en)*2007-06-202008-12-25Direct Route, LlcMethod and apparatus for routing of network addresses
US20080320164A1 (en)*2007-06-202008-12-25Direct Route, LlcMethod and apparatus for routing of network addresses
US7467229B1 (en)*2007-06-202008-12-16Direct Route, LlcMethod and apparatus for routing of network addresses
US8984620B2 (en)*2007-07-062015-03-17Cyberoam Technologies Pvt. Ltd.Identity and policy-based network security and management system and method
US20100100949A1 (en)*2007-07-062010-04-22Abhilash Vijay SonwaneIdentity and policy-based network security and management system and method
US7783666B1 (en)2007-09-262010-08-24Netapp, Inc.Controlling access to storage resources by using access pattern based quotas
US9225684B2 (en)2007-10-292015-12-29Microsoft Technology Licensing, LlcControlling network access
US9015484B2 (en)2007-12-142015-04-21Intel CorporationSymmetric key distribution framework for the Internet
US9654453B2 (en)2007-12-142017-05-16Intel CorporationSymmetric key distribution framework for the Internet
US20090168657A1 (en)*2007-12-302009-07-02Rahoul PuriSystem and Method for Validating Packet Classification
US7706289B2 (en)*2007-12-302010-04-27Oracle America, Inc.System and method for validating packet classification
US20100023797A1 (en)*2008-07-252010-01-28Rajeev AtluriSequencing technique to account for a clock error in a backup system
US8028194B2 (en)2008-07-252011-09-27Inmage Systems, IncSequencing technique to account for a clock error in a backup system
US8250413B2 (en)*2008-09-302012-08-21Hewlett-Packard Development Company, L.P.Connection broker assignment status reporting
US20100083032A1 (en)*2008-09-302010-04-01Alcorn Byron AConnection broker assignment status reporting
US8844020B2 (en)2008-12-102014-09-23Amazon Technologies, Inc.Establishing secure remote access to private computer networks
US10728089B2 (en)2008-12-102020-07-28Amazon Technologies, Inc.Providing access to configurable private computer networks
US9374341B2 (en)2008-12-102016-06-21Amazon Technologies, Inc.Establishing secure remote access to private computer networks
US11831496B2 (en)2008-12-102023-11-28Amazon Technologies, Inc.Providing access to configurable private computer networks
US11290320B2 (en)2008-12-102022-03-29Amazon Technologies, Inc.Providing access to configurable private computer networks
US9521037B2 (en)2008-12-102016-12-13Amazon Technologies, Inc.Providing access to configurable private computer networks
US10951586B2 (en)2008-12-102021-03-16Amazon Technologies, Inc.Providing location-specific network access to remote services
US8230050B1 (en)*2008-12-102012-07-24Amazon Technologies, Inc.Providing access to configurable private computer networks
US9137209B1 (en)2008-12-102015-09-15Amazon Technologies, Inc.Providing local secure network access to remote services
US8578003B2 (en)2008-12-102013-11-05Amazon Technologies, Inc.Providing access to configurable private computer networks
US9524167B1 (en)2008-12-102016-12-20Amazon Technologies, Inc.Providing location-specific network access to remote services
US12432110B2 (en)2008-12-102025-09-30Amazon Technologies, Inc.Providing access to configurable private computer networks
US8201237B1 (en)2008-12-102012-06-12Amazon Technologies, Inc.Establishing secure remote access to private computer networks
US10868715B2 (en)2008-12-102020-12-15Amazon Technologies, Inc.Providing local secure network access to remote services
US9756018B2 (en)2008-12-102017-09-05Amazon Technologies, Inc.Establishing secure remote access to private computer networks
US8069227B2 (en)2008-12-262011-11-29Inmage Systems, Inc.Configuring hosts of a secondary data storage and recovery system
US20100169592A1 (en)*2008-12-262010-07-01Rajeev AtluriGenerating a recovery snapshot and creating a virtual view of the recovery snapshot
US8527721B2 (en)2008-12-262013-09-03Rajeev AtluriGenerating a recovery snapshot and creating a virtual view of the recovery snapshot
WO2010077222A1 (en)*2008-12-302010-07-08Thomson LicensingSynchronization of configurations for display systems
US20110258299A1 (en)*2008-12-302011-10-20Thomson LicensingSynchronization of configurations for display systems
US8949412B2 (en)*2009-02-052015-02-03Ipanema TechnologiesMethod for management of data stream exchanges in an autonomic telecommunications network
US20120023213A1 (en)*2009-02-052012-01-26Ipanema TechnologiesMethod for management of data stream exchanges in an autonomic telecommunications network
US8977750B2 (en)*2009-02-242015-03-10Red Hat, Inc.Extending security platforms to cloud-based networks
US20100217850A1 (en)*2009-02-242010-08-26James Michael FerrisSystems and methods for extending security platforms to cloud-based networks
WO2011056317A1 (en)*2009-10-272011-05-12Motorola Solutions, Inc.Method for providing security associations for encrypted packet data
US8850026B2 (en)2009-11-162014-09-30At&T Intellectual Property I, L.P.Methods and apparatus to allocate resources associated with a distributive computing network
US8438286B2 (en)2009-11-162013-05-07At&T Intellectual Property I, L.P.Methods and apparatus to allocate resources associated with a distributive computing network
US8250213B2 (en)2009-11-162012-08-21At&T Intellectual Property I, L.P.Methods and apparatus to allocate resources associated with a distributive computing network
US20110119381A1 (en)*2009-11-162011-05-19Rene GloverMethods and apparatus to allocate resources associated with a distributive computing network
US8705513B2 (en)2009-12-152014-04-22At&T Intellectual Property I, L.P.Methods and apparatus to communicatively couple virtual private networks to virtual machines within distributive computing networks
US20110142053A1 (en)*2009-12-152011-06-16Jacobus Van Der MerweMethods and apparatus to communicatively couple virtual private networks to virtual machines within distributive computing networks
US20110209141A1 (en)*2010-02-252011-08-25Red Hat, Inc.Managing a user proxy configuration in a daemon that frequently loads and unloads and is used by multiple users simultaneously
US9069639B2 (en)*2010-02-252015-06-30Red Hat, Inc.Managing a user proxy configuration in a daemon that frequently loads and unloads
US9183374B2 (en)*2010-07-152015-11-10Novell, Inc.Techniques for identity-enabled interface deployment
US20120017085A1 (en)*2010-07-152012-01-19Carter Stephen RTechniques for identity-enabled interface deployment
US8856255B2 (en)2010-08-242014-10-07At&T Intellectual Property I, L.P.Methods and apparatus to migrate virtual machines between distributive computing networks across a wide area network
US8473557B2 (en)2010-08-242013-06-25At&T Intellectual Property I, L.P.Methods and apparatus to migrate virtual machines between distributive computing networks across a wide area network
US9432258B2 (en)2011-06-062016-08-30At&T Intellectual Property I, L.P.Methods and apparatus to configure virtual private mobile networks to reduce latency
US10419992B2 (en)2011-06-062019-09-17At&T Intellectual Property I, L.P.Methods and apparatus to migrate a mobile device from a first virtual private mobile network to a second virtual private mobile network to reduce latency
US9386035B2 (en)2011-06-212016-07-05At&T Intellectual Property I, L.P.Methods and apparatus to configure virtual private mobile networks for security
US10069799B2 (en)2011-06-212018-09-04At&T Intellectual Property I, L.P.Methods and apparatus to configure virtual private mobile networks for security
US10044678B2 (en)2011-08-312018-08-07At&T Intellectual Property I, L.P.Methods and apparatus to configure virtual private mobile networks with virtual private networks
US20130064088A1 (en)*2011-09-092013-03-14Futurewei Technologies, Inc.Apparatus and System for Packet Routing and Forwarding in an Interior Network
US8797874B2 (en)*2011-09-092014-08-05Futurewei Technologies, Inc.Apparatus and system for packet routing and forwarding in an interior network
US10666653B2 (en)2012-08-302020-05-26Aerohive Networks, Inc.Internetwork authentication
US9473484B2 (en)*2012-08-302016-10-18Aerohive Networks, Inc.Internetwork authentication
US10243956B2 (en)2012-08-302019-03-26Aerohive Networks, Inc.Internetwork authentication
US20150350183A1 (en)*2012-08-302015-12-03Aerohive Networks, Inc.Internetwork Authentication
US9979727B2 (en)2012-08-302018-05-22Aerohive Networks, Inc.Internetwork authentication
US9762579B2 (en)2012-08-302017-09-12Aerohive Networks, Inc.Internetwork authentication
US11012474B2 (en)*2012-10-222021-05-18Centripetal Networks, Inc.Methods and systems for protecting a secured network
US9560077B2 (en)2012-10-222017-01-31Centripetal Networks, Inc.Methods and systems for protecting a secured network
US10091246B2 (en)2012-10-222018-10-02Centripetal Networks, Inc.Methods and systems for protecting a secured network
US10567437B2 (en)2012-10-222020-02-18Centripetal Networks, Inc.Methods and systems for protecting a secured network
AU2013335255B2 (en)*2012-10-222017-07-06Centripetal LimitedMethods and systems for protecting a secured network
US9565213B2 (en)2012-10-222017-02-07Centripetal Networks, Inc.Methods and systems for protecting a secured network
US9137205B2 (en)*2012-10-222015-09-15Centripetal Networks, Inc.Methods and systems for protecting a secured network
US12107893B2 (en)2012-10-222024-10-01Centripetal Networks, LlcMethods and systems for protecting a secured network
US20140115654A1 (en)*2012-10-222014-04-24Centripetal Networks, Inc.Methods and systems for protecting a secured network
US10785266B2 (en)2012-10-222020-09-22Centripetal Networks, Inc.Methods and systems for protecting a secured network
EP2909989B1 (en)*2012-10-222021-10-13Centripetal Networks, Inc.Methods and systems for protecting a secured network
US9397978B1 (en)*2012-12-212016-07-19Western Digital Technologies, Inc.Cloud to local router security
US10541972B2 (en)2013-01-112020-01-21Centripetal Networks, Inc.Rule swapping in a packet network
US11502996B2 (en)2013-01-112022-11-15Centripetal Networks, Inc.Rule swapping in a packet network
US10284522B2 (en)2013-01-112019-05-07Centripetal Networks, Inc.Rule swapping for network protection
US9203806B2 (en)2013-01-112015-12-01Centripetal Networks, Inc.Rule swapping in a packet network
US10511572B2 (en)2013-01-112019-12-17Centripetal Networks, Inc.Rule swapping in a packet network
US9674148B2 (en)2013-01-112017-06-06Centripetal Networks, Inc.Rule swapping in a packet network
US10681009B2 (en)2013-01-112020-06-09Centripetal Networks, Inc.Rule swapping in a packet network
US11539665B2 (en)2013-01-112022-12-27Centripetal Networks, Inc.Rule swapping in a packet network
US10326801B2 (en)2013-02-052019-06-18Fortinet, Inc.Cloud-based security policy configuration
US9160713B2 (en)2013-03-122015-10-13Centripetal Networks, Inc.Filtering network data transfers
US9124552B2 (en)2013-03-122015-09-01Centripetal Networks, Inc.Filtering network data transfers
US10567343B2 (en)2013-03-122020-02-18Centripetal Networks, Inc.Filtering network data transfers
US9686193B2 (en)2013-03-122017-06-20Centripetal Networks, Inc.Filtering network data transfers
US11012415B2 (en)2013-03-122021-05-18Centripetal Networks, Inc.Filtering network data transfers
US11418487B2 (en)2013-03-122022-08-16Centripetal Networks, Inc.Filtering network data transfers
US10735380B2 (en)2013-03-122020-08-04Centripetal Networks, Inc.Filtering network data transfers
US10505898B2 (en)2013-03-122019-12-10Centripetal Networks, Inc.Filtering network data transfers
US11496497B2 (en)2013-03-152022-11-08Centripetal Networks, Inc.Protecting networks from cyber attacks and overloading
US9762679B2 (en)*2013-03-152017-09-12Aerohive Networks, Inc.Providing stateless network services
US10355977B2 (en)2013-03-152019-07-16Aerohive Networks, Inc.Gateway using multicast to unicast conversion
US10230802B2 (en)2013-03-152019-03-12Aerohive Networks, Inc.Providing stateless network services
US10862909B2 (en)2013-03-152020-12-08Centripetal Networks, Inc.Protecting networks from cyber attacks and overloading
US9769056B2 (en)2013-03-152017-09-19Aerohive Networks, Inc.Gateway using multicast to unicast conversion
US11336560B2 (en)2013-03-152022-05-17Extreme Networks, Inc.Gateway using multicast to unicast conversion
US20140280461A1 (en)*2013-03-152014-09-18Aerohive Networks, Inc.Providing stateless network services
US9094445B2 (en)2013-03-152015-07-28Centripetal Networks, Inc.Protecting networks from cyber attacks and overloading
US10142173B2 (en)*2013-04-292018-11-27Amazon Technologies, Inc.Automated creation of private virtual networks in a service provider network
US20140325037A1 (en)*2013-04-292014-10-30Amazon Technologies, Inc.Automated Creation of Private Virtual Networks in a Service Provider Network
US9836347B2 (en)2013-08-092017-12-05Datto, Inc.Apparatuses, methods and systems for determining a virtual machine state
US10705939B2 (en)2013-08-092020-07-07Datto, Inc.Apparatuses, methods and systems for determining a virtual machine state
US9516061B2 (en)2013-11-262016-12-06Cisco Technology, Inc.Smart virtual private network
US9753784B2 (en)2013-11-272017-09-05At&T Intellectual Property I, L.P.Cloud delivery platform
US10951660B2 (en)2014-04-162021-03-16Centripetal Networks, Inc.Methods and systems for protecting a secured network
US10749906B2 (en)2014-04-162020-08-18Centripetal Networks, Inc.Methods and systems for protecting a secured network
US20190312911A1 (en)*2014-04-162019-10-10Centripetal Networks, Inc.Methods and Systems for Protecting a Secured Network
US10142372B2 (en)*2014-04-162018-11-27Centripetal Networks, Inc.Methods and systems for protecting a secured network
US10944792B2 (en)2014-04-162021-03-09Centripetal Networks, Inc.Methods and systems for protecting a secured network
EP4020883A1 (en)*2014-04-162022-06-29Centripetal Networks Inc.Methods and systems for protecting a secured network
EP3869767B1 (en)2014-04-162022-01-05Centripetal Networks Inc.Methods and systems for protecting a secured network
EP3550795B1 (en)2014-04-162021-06-02Centripetal Networks Inc.Methods and systems for protecting a secured network
US11477237B2 (en)2014-04-162022-10-18Centripetal Networks, Inc.Methods and systems for protecting a secured network
EP3550795A1 (en)*2014-04-162019-10-09Centripetal Networks Inc.Methods and systems for protecting a secured network
US9992619B2 (en)2014-08-122018-06-05Aerohive Networks, Inc.Network device based proximity beacon locating
US10694319B2 (en)2014-08-122020-06-23Extreme Networks, Inc.Network device based proximity beacon locating
US10123168B2 (en)2014-08-122018-11-06Aerohive Networks, Inc.Network device based proximity beacon locating
US9558078B2 (en)2014-10-282017-01-31Microsoft Technology Licensing, LlcPoint in time database restore from storage snapshots
US10404521B2 (en)2015-01-142019-09-03Datto, Inc.Remotely configurable routers with failover features, and methods and apparatus for reliable web-based administration of same
US10797933B2 (en)2015-01-142020-10-06Datto, Inc.Remotely configurable routers with failover features, and methods and apparatus for reliable web-based administration of same
WO2016115409A1 (en)*2015-01-142016-07-21Datto, Inc.Remotely configurable routers with failover features, and methods and apparatus for reliable web-based administration of same
US9264370B1 (en)2015-02-102016-02-16Centripetal Networks, Inc.Correlating packets in communications networks
US11956338B2 (en)2015-02-102024-04-09Centripetal Networks, LlcCorrelating packets in communications networks
US10931797B2 (en)2015-02-102021-02-23Centripetal Networks, Inc.Correlating packets in communications networks
US11683401B2 (en)2015-02-102023-06-20Centripetal Networks, LlcCorrelating packets in communications networks
US9560176B2 (en)2015-02-102017-01-31Centripetal Networks, Inc.Correlating packets in communications networks
US10530903B2 (en)2015-02-102020-01-07Centripetal Networks, Inc.Correlating packets in communications networks
US10659573B2 (en)2015-02-102020-05-19Centripetal Networks, Inc.Correlating packets in communications networks
US9413722B1 (en)2015-04-172016-08-09Centripetal Networks, Inc.Rule-based network-threat detection
US11792220B2 (en)2015-04-172023-10-17Centripetal Networks, LlcRule-based network-threat detection
US11496500B2 (en)2015-04-172022-11-08Centripetal Networks, Inc.Rule-based network-threat detection
US10757126B2 (en)2015-04-172020-08-25Centripetal Networks, Inc.Rule-based network-threat detection
US12015626B2 (en)2015-04-172024-06-18Centripetal Networks, LlcRule-based network-threat detection
US10193917B2 (en)2015-04-172019-01-29Centripetal Networks, Inc.Rule-based network-threat detection
US10542028B2 (en)*2015-04-172020-01-21Centripetal Networks, Inc.Rule-based network-threat detection
US10609062B1 (en)2015-04-172020-03-31Centripetal Networks, Inc.Rule-based network-threat detection
US11012459B2 (en)2015-04-172021-05-18Centripetal Networks, Inc.Rule-based network-threat detection
US10567413B2 (en)2015-04-172020-02-18Centripetal Networks, Inc.Rule-based network-threat detection
US9866576B2 (en)2015-04-172018-01-09Centripetal Networks, Inc.Rule-based network-threat detection
US11516241B2 (en)2015-04-172022-11-29Centripetal Networks, Inc.Rule-based network-threat detection
US11700273B2 (en)2015-04-172023-07-11Centripetal Networks, LlcRule-based network-threat detection
US10872016B2 (en)2015-06-162020-12-22Datto, Inc.Hybrid cloud methods, apparatus and systems for secure file sharing and synchronization with backup and server virtualization
US11811809B2 (en)2015-12-232023-11-07Centripetal Networks, LlcRule-based network-threat detection for encrypted communications
US12010135B2 (en)2015-12-232024-06-11Centripetal Networks, LlcRule-based network-threat detection for encrypted communications
US9917856B2 (en)2015-12-232018-03-13Centripetal Networks, Inc.Rule-based network-threat detection for encrypted communications
US11477224B2 (en)2015-12-232022-10-18Centripetal Networks, Inc.Rule-based network-threat detection for encrypted communications
US11824879B2 (en)2015-12-232023-11-21Centripetal Networks, LlcRule-based network-threat detection for encrypted communications
US11563758B2 (en)2015-12-232023-01-24Centripetal Networks, Inc.Rule-based network-threat detection for encrypted communications
US11811810B2 (en)2015-12-232023-11-07Centripetal Networks, LlcRule-based network threat detection for encrypted communications
US11811808B2 (en)2015-12-232023-11-07Centripetal Networks, LlcRule-based network-threat detection for encrypted communications
US11729144B2 (en)2016-01-042023-08-15Centripetal Networks, LlcEfficient packet capture for cyber threat analysis
US12375447B2 (en)2016-01-042025-07-29Centripetal Networks, LlcEfficient packet capture for cyber threat analysis
US12126596B2 (en)2016-02-012024-10-22Omnissa, LlcConfiguring network security based on device management characteristics
US11290425B2 (en)*2016-02-012022-03-29Airwatch LlcConfiguring network security based on device management characteristics
US11209803B2 (en)*2016-07-122021-12-28Siemens AktiengesellschaftFirewall system and method for establishing secured communications connections to an industrial automation system
US10841337B2 (en)2016-11-282020-11-17Secureworks Corp.Computer implemented system and method, and computer program product for reversibly remediating a security risk
US11665201B2 (en)2016-11-282023-05-30Secureworks Corp.Computer implemented system and method, and computer program product for reversibly remediating a security risk
US10503899B2 (en)2017-07-102019-12-10Centripetal Networks, Inc.Cyberanalysis workflow acceleration
US11797671B2 (en)2017-07-102023-10-24Centripetal Networks, LlcCyberanalysis workflow acceleration
US11574047B2 (en)2017-07-102023-02-07Centripetal Networks, Inc.Cyberanalysis workflow acceleration
US12019745B2 (en)2017-07-102024-06-25Centripetal Networks, LlcCyberanalysis workflow acceleration
US10284526B2 (en)2017-07-242019-05-07Centripetal Networks, Inc.Efficient SSL/TLS proxy
US12034710B2 (en)2017-07-242024-07-09Centripetal Networks, LlcEfficient SSL/TLS proxy
US11233777B2 (en)2017-07-242022-01-25Centripetal Networks, Inc.Efficient SSL/TLS proxy
US11632398B2 (en)2017-11-062023-04-18Secureworks Corp.Systems and methods for sharing, distributing, or accessing security data and/or security applications, models, or analytics
US10735470B2 (en)2017-11-062020-08-04Secureworks Corp.Systems and methods for sharing, distributing, or accessing security data and/or security applications, models, or analytics
US10594713B2 (en)2017-11-102020-03-17Secureworks Corp.Systems and methods for secure propagation of statistical models within threat intelligence communities
US11003718B2 (en)2018-06-122021-05-11Secureworks Corp.Systems and methods for enabling a global aggregated search, while allowing configurable client anonymity
US11044263B2 (en)2018-06-122021-06-22Secureworks Corp.Systems and methods for threat discovery across distinct organizations
US10785238B2 (en)2018-06-122020-09-22Secureworks Corp.Systems and methods for threat discovery across distinct organizations
US10846070B2 (en)2018-07-052020-11-24At&T Intellectual Property I, L.P.Facilitating cloud native edge computing via behavioral intelligence
US11334332B2 (en)2018-07-052022-05-17At&T Intellectual Property I, L.P.Facilitating cloud native edge computing via behavioral intelligence
US10333898B1 (en)2018-07-092019-06-25Centripetal Networks, Inc.Methods and systems for efficient network protection
US12413553B2 (en)2018-07-092025-09-09Centripetal Networks, LlcMethods and systems for efficient network protection
US11290424B2 (en)2018-07-092022-03-29Centripetal Networks, Inc.Methods and systems for efficient network protection
US11310268B2 (en)2019-05-062022-04-19Secureworks Corp.Systems and methods using computer vision and machine learning for detection of malicious actions
US11418524B2 (en)2019-05-072022-08-16SecureworksCorp.Systems and methods of hierarchical behavior activity modeling and detection for systems-level security
US11349877B2 (en)*2019-06-202022-05-31Servicenow, Inc.Solution management systems and methods for addressing cybersecurity vulnerabilities
US11381589B2 (en)2019-10-112022-07-05Secureworks Corp.Systems and methods for distributed extended common vulnerabilities and exposures data management
US11522877B2 (en)2019-12-162022-12-06Secureworks Corp.Systems and methods for identifying malicious actors or activities
US11588834B2 (en)2020-09-032023-02-21Secureworks Corp.Systems and methods for identifying attack patterns or suspicious activity in client networks
US11736440B2 (en)2020-10-272023-08-22Centripetal Networks, LlcMethods and systems for efficient adaptive logging of cyber threat incidents
US12113771B2 (en)2020-10-272024-10-08Centripetal Networks, LlcMethods and systems for efficient adaptive logging of cyber threat incidents
US11539664B2 (en)2020-10-272022-12-27Centripetal Networks, Inc.Methods and systems for efficient adaptive logging of cyber threat incidents
US11528294B2 (en)2021-02-182022-12-13SecureworksCorp.Systems and methods for automated threat detection
US11444963B1 (en)2021-04-202022-09-13Centripetal Networks, Inc.Efficient threat context-aware packet filtering for network protection
US11159546B1 (en)2021-04-202021-10-26Centripetal Networks, Inc.Methods and systems for efficient threat context-aware packet filtering for network protection
US11316876B1 (en)2021-04-202022-04-26Centripetal Networks, Inc.Efficient threat context-aware packet filtering for network protection
US11349854B1 (en)2021-04-202022-05-31Centripetal Networks, Inc.Efficient threat context-aware packet filtering for network protection
US11824875B2 (en)2021-04-202023-11-21Centripetal Networks, LlcEfficient threat context-aware packet filtering for network protection
US12218959B2 (en)2021-04-202025-02-04Centripetal Networks, LlcEfficient threat context-aware packet filtering for network protection
US11438351B1 (en)2021-04-202022-09-06Centripetal Networks, Inc.Efficient threat context-aware packet filtering for network protection
US11552970B2 (en)2021-04-202023-01-10Centripetal Networks, Inc.Efficient threat context-aware packet filtering for network protection
US12135789B2 (en)2021-08-042024-11-05Secureworks Corp.Systems and methods of attack type and likelihood prediction
US12034751B2 (en)2021-10-012024-07-09Secureworks Corp.Systems and methods for detecting malicious hands-on-keyboard activity via machine learning
US12081438B2 (en)*2021-10-112024-09-03Hewlett Packard Enterprise Development LpAutomatic policy engine selection
US20230112579A1 (en)*2021-10-112023-04-13Hewlett Packard Enterprise Development LpAutomatic policy engine selection
US12015623B2 (en)2022-06-242024-06-18Secureworks Corp.Systems and methods for consensus driven threat intelligence

Also Published As

Publication numberPublication date
ATE360937T1 (en)2007-05-15
US6944183B1 (en)2005-09-13
EP1145519B1 (en)2005-08-31
WO2000078004A9 (en)2002-08-01
AU5486800A (en)2001-01-02
ATE326801T1 (en)2006-06-15
US6678835B1 (en)2004-01-13
JP2003502757A (en)2003-01-21
WO2000078004A3 (en)2001-08-30
EP1145519A2 (en)2001-10-17
ATE350829T1 (en)2007-01-15
ATE301895T1 (en)2005-08-15
ATE303690T1 (en)2005-09-15
JP2005065305A (en)2005-03-10
WO2000078004A2 (en)2000-12-21
CN1483270A (en)2004-03-17
CN100384191C (en)2008-04-23

Similar Documents

PublicationPublication DateTitle
US6708187B1 (en)Method for selective LDAP database synchronization
US6944183B1 (en)Object model for network policy management
US7032022B1 (en)Statistics aggregation for policy-based network
EP1143661B1 (en)System and method for automatic reachability updating in virtual private networks
US5968176A (en)Multilayer firewall system
US6131120A (en)Enterprise network management directory containing network addresses of users and devices providing access lists to routers and servers
US7200662B2 (en)Integrated rule network management system
US6079020A (en)Method and apparatus for managing a virtual private network
EP1134955A1 (en)Enterprise network management using directory containing network addresses of users and devices providing access lists to routers and servers
US20030154404A1 (en)Policy engine for modular generation of policy for a flat, per-device database
US10795912B2 (en)Synchronizing a forwarding database within a high-availability cluster
US20250080378A1 (en)Scalable distribution of identity information in overlay networks with identity-based policies
Boucadair et al.RFC 9834 YANG Data Models for Bearers and Attachment Circuits as a Service (ACaaS)
DE60028004T2 (en) Virtual private network with automatic updating of user accessibility information
ConnectAWS Direct Connect
AU2237000A (en)Enterprise network management using directory containing network addresses of users and devices providing access lists to routers and servers

Legal Events

DateCodeTitleDescription
STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp