| FR2258112A5              (en) | 1973-11-30 | 1975-08-08 | Honeywell Bull Soc Ind |  | 
| US3956615A              (en) | 1974-06-25 | 1976-05-11 | Ibm Corporation | Transaction execution system with secure data storage and communications | 
| US4104721A              (en) | 1976-12-30 | 1978-08-01 | International Business Machines Corporation | Hierarchical security mechanism for dynamically assigning security levels to object programs | 
| US4200770A              (en) | 1977-09-06 | 1980-04-29 | Stanford University | Cryptographic apparatus and method | 
| US4405829A              (en) | 1977-12-14 | 1983-09-20 | Massachusetts Institute Of Technology | Cryptographic communications system and method | 
| US4289930A              (en) | 1978-11-30 | 1981-09-15 | The General Electric Company Limited | Electronic apparatus for the display of information received over a line | 
| US4386416A              (en) | 1980-06-02 | 1983-05-31 | Mostek Corporation | Data compression, encryption, and in-line transmission system | 
| US4384325A              (en) | 1980-06-23 | 1983-05-17 | Sperry Corporation | Apparatus and method for searching a data base using variable search criteria | 
| US4386233A              (en) | 1980-09-29 | 1983-05-31 | Smid Miles E | Crytographic key notarization methods and apparatus | 
| US4442484A              (en) | 1980-10-14 | 1984-04-10 | Intel Corporation | Microprocessor memory management and protection mechanism | 
| US4648031A              (en) | 1982-06-21 | 1987-03-03 | International Business Machines Corporation | Method and apparatus for restarting a computing system | 
| US4532588A              (en) | 1982-11-09 | 1985-07-30 | International Business Machines Corporation | Electronic document distribution network with uniform data stream | 
| US4641274A              (en)* | 1982-12-03 | 1987-02-03 | International Business Machines Corporation | Method for communicating changes made to text form a text processor to a remote host | 
| NL8301458A              (en) | 1983-04-26 | 1984-11-16 | Philips Nv | METHOD FOR DISTRIBUTING AND USING ENCRYPTION KEYS. | 
| US4870571A              (en) | 1983-05-04 | 1989-09-26 | The Johns Hopkins University | Intercomputer communications based on message broadcasting with receiver selection | 
| US4590470A              (en) | 1983-07-11 | 1986-05-20 | At&T Bell Laboratories | User authentication system employing encryption functions | 
| US4926480A              (en) | 1983-08-22 | 1990-05-15 | David Chaum | Card-computer moderated systems | 
| US4947430A              (en) | 1987-11-23 | 1990-08-07 | David Chaum | Undeniable signature systems | 
| US4584639A              (en) | 1983-12-23 | 1986-04-22 | Key Logic, Inc. | Computer security system | 
| US4621321A              (en) | 1984-02-16 | 1986-11-04 | Honeywell Inc. | Secure data processing system architecture | 
| US4710763A              (en) | 1984-10-19 | 1987-12-01 | Texas Instruments Incorporated | Method for generating and displaying tree structures in a limited display area | 
| US4713753A              (en) | 1985-02-21 | 1987-12-15 | Honeywell Inc. | Secure data processing system architecture with format control | 
| US4713780A              (en) | 1985-04-15 | 1987-12-15 | Express Communications, Inc. | Electronic mail | 
| US4754428A              (en) | 1985-04-15 | 1988-06-28 | Express Communications, Inc. | Apparatus and method of distributing documents to remote terminals with different formats | 
| US4914568A              (en) | 1986-10-24 | 1990-04-03 | National Instruments, Inc. | Graphical system for modelling a process and associated method | 
| US4837798A              (en) | 1986-06-02 | 1989-06-06 | American Telephone And Telegraph Company | Communication system having unified messaging | 
| NL8602418A              (en) | 1986-09-25 | 1988-04-18 | Philips Nv | DEVICE FOR DISPLAYING A PCM MODULATED SIGNAL WITH A MUTE CIRCUIT. | 
| JP2702927B2              (en) | 1987-06-15 | 1998-01-26 | 株式会社日立製作所 | String search device | 
| DE3851724T2              (en) | 1987-07-08 | 1995-05-04 | Matsushita Electric Ind Co Ltd | Method and device for protecting copy signals. | 
| FR2618002B1              (en) | 1987-07-10 | 1991-07-05 | Schlumberger Ind Sa | METHOD AND SYSTEM FOR AUTHENTICATING ELECTRONIC MEMORY CARDS | 
| US4853961A              (en) | 1987-12-18 | 1989-08-01 | Pitney Bowes Inc. | Reliable document authentication system | 
| US4885789A              (en) | 1988-02-01 | 1989-12-05 | International Business Machines Corporation | Remote trusted path mechanism for telnet | 
| US5214702A              (en) | 1988-02-12 | 1993-05-25 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification | 
| US5005200A              (en) | 1988-02-12 | 1991-04-02 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification | 
| US4868877A              (en) | 1988-02-12 | 1989-09-19 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification | 
| CA1314101C              (en) | 1988-02-17 | 1993-03-02 | Henry Shao-Lin Teng | Expert system for security inspection of a digital computer system in a network environment | 
| US4951196A              (en) | 1988-05-04 | 1990-08-21 | Supply Tech, Inc. | Method and apparatus for electronic data interchange | 
| US5008814A              (en) | 1988-08-15 | 1991-04-16 | Network Equipment Technologies, Inc. | Method and apparatus for updating system software for a plurality of data processing units in a communication network | 
| US5144660A              (en) | 1988-08-31 | 1992-09-01 | Rose Anthony M | Securing a computer against undesired write operations to or read operations from a mass storage device | 
| US5054096A              (en) | 1988-10-24 | 1991-10-01 | Empire Blue Cross/Blue Shield | Method and apparatus for converting documents into electronic data for transaction processing | 
| US4975950A              (en) | 1988-11-03 | 1990-12-04 | Lentz Stephen A | System and method of protecting integrity of computer data and software | 
| US5313637A              (en) | 1988-11-29 | 1994-05-17 | Rose David K | Method and apparatus for validating authorization to access information in an information processing system | 
| US5167011A              (en) | 1989-02-15 | 1992-11-24 | W. H. Morris | Method for coodinating information storage and retrieval | 
| US5210824A              (en) | 1989-03-03 | 1993-05-11 | Xerox Corporation | Encoding-format-desensitized methods and means for interchanging electronic document as appearances | 
| US5020059A              (en) | 1989-03-31 | 1991-05-28 | At&T Bell Laboratories | Reconfigurable signal processor | 
| US5191611A              (en) | 1989-04-03 | 1993-03-02 | Lang Gerald S | Method and apparatus for protecting material on storage media and for transferring material on storage media to various recipients | 
| US5144659A              (en) | 1989-04-19 | 1992-09-01 | Richard P. Jones | Computer file protection system | 
| US5119465A              (en) | 1989-06-19 | 1992-06-02 | Digital Equipment Corporation | System for selectively converting plurality of source data structures through corresponding source intermediate structures, and target intermediate structures into selected target structure | 
| US4996711A              (en)* | 1989-06-21 | 1991-02-26 | Chaum David L | Selected-exponent signature systems | 
| GB8918553D0              (en) | 1989-08-15 | 1989-09-27 | Digital Equipment Int | Message control system | 
| US5105184B1              (en) | 1989-11-09 | 1997-06-17 | Noorali Pirani | Methods for displaying and integrating commercial advertisements with computer software | 
| US5495610A              (en)* | 1989-11-30 | 1996-02-27 | Seer Technologies, Inc. | Software distribution system to build and distribute a software release | 
| GB8927623D0              (en)* | 1989-12-06 | 1990-02-07 | Bicc Plc | Repeaters for secure local area networks | 
| US5159685A              (en)* | 1989-12-06 | 1992-10-27 | Racal Data Communications Inc. | Expert system for communications network | 
| DE68925695D1              (en) | 1989-12-13 | 1996-03-28 | Ibm | Computer system security device | 
| US5093914A              (en) | 1989-12-15 | 1992-03-03 | At&T Bell Laboratories | Method of controlling the execution of object-oriented programs | 
| DE69031614T2              (en)* | 1990-01-29 | 1998-05-07 | Security Techn Corp | Optionally moderated transaction systems | 
| US5263157A              (en) | 1990-02-15 | 1993-11-16 | International Business Machines Corporation | Method and system for providing user access control within a distributed data processing system by the exchange of access control profiles | 
| JP3080382B2              (en) | 1990-02-21 | 2000-08-28 | 株式会社日立製作所 | Cryptographic communication system | 
| EP0451384B1              (en) | 1990-04-10 | 1997-09-24 | International Business Machines Corporation | Hypertext data processing system and method | 
| US5319776A              (en) | 1990-04-19 | 1994-06-07 | Hilgraeve Corporation | In transit detection of computer virus with safeguard | 
| US5210825A              (en) | 1990-04-26 | 1993-05-11 | Teknekron Communications Systems, Inc. | Method and an apparatus for displaying graphical data received from a remote computer by a local computer | 
| US5822527A              (en) | 1990-05-04 | 1998-10-13 | Digital Equipment Corporation | Method and apparatus for information stream filtration using tagged information access and action registration | 
| US5226080A              (en) | 1990-06-22 | 1993-07-06 | Grid Systems Corporation | Method and apparatus for password protection of a computer | 
| US5204961A              (en) | 1990-06-25 | 1993-04-20 | Digital Equipment Corporation | Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding security protocols | 
| US5070528A              (en) | 1990-06-29 | 1991-12-03 | Digital Equipment Corporation | Generic encryption technique for communication networks | 
| GB9015799D0              (en) | 1990-07-18 | 1991-06-12 | Plessey Telecomm | A data communication system | 
| US5124984A              (en) | 1990-08-07 | 1992-06-23 | Concord Communications, Inc. | Access controller for local area network | 
| US5144557A              (en) | 1990-08-13 | 1992-09-01 | International Business Machines Corporation | Method and system for document distribution by reference to a first group and particular document to a second group of user in a data processing system | 
| US5276869A              (en)* | 1990-09-10 | 1994-01-04 | International Business Machines Corporation | System for selecting document recipients as determined by technical content of document and for electronically corroborating receipt of document | 
| US5247661A              (en) | 1990-09-10 | 1993-09-21 | International Business Machines Corporation | Method and apparatus for automated document distribution in a data processing system | 
| US5790198A              (en) | 1990-09-10 | 1998-08-04 | Starsight Telecast, Inc. | Television schedule information transmission and utilization system and process | 
| US5224163A              (en) | 1990-09-28 | 1993-06-29 | Digital Equipment Corporation | Method for delegating authorization from one entity to another through the use of session encryption keys | 
| US5315657A              (en) | 1990-09-28 | 1994-05-24 | Digital Equipment Corporation | Compound principals in access control lists | 
| US5239466A              (en) | 1990-10-04 | 1993-08-24 | Motorola, Inc. | System for selectively routing and merging independent annotations to a document at remote locations | 
| US5153918A              (en) | 1990-11-19 | 1992-10-06 | Vorec Corporation | Security system for data communications | 
| JP3161725B2              (en)* | 1990-11-21 | 2001-04-25 | 株式会社日立製作所 | Workstations and collaborative information processing systems | 
| US5283887A              (en)* | 1990-12-19 | 1994-02-01 | Bull Hn Information Systems Inc. | Automatic document format conversion in an electronic mail system based upon user preference | 
| US5263147A              (en) | 1991-03-01 | 1993-11-16 | Hughes Training, Inc. | System for providing high security for personal computers and workstations | 
| JP3177684B2              (en) | 1991-03-14 | 2001-06-18 | 株式会社日立製作所 | Email system | 
| US5424724A              (en) | 1991-03-27 | 1995-06-13 | International Business Machines Corporation | Method and apparatus for enhanced electronic mail distribution | 
| US5272754A              (en) | 1991-03-28 | 1993-12-21 | Secure Computing Corporation | Secure computer interface | 
| US5513323A              (en) | 1991-06-14 | 1996-04-30 | International Business Machines Corporation | Method and apparatus for multistage document format transformation in a data processing system | 
| US5228083A              (en) | 1991-06-28 | 1993-07-13 | Digital Equipment Corporation | Cryptographic processing in a communication network, using a single cryptographic engine | 
| US5577209A              (en) | 1991-07-11 | 1996-11-19 | Itt Corporation | Apparatus and method for providing multi-level security for communication among computers and terminals on a network | 
| US5379340A              (en)* | 1991-08-02 | 1995-01-03 | Betterprize Limited | Text communication system | 
| US5621579A              (en) | 1991-08-19 | 1997-04-15 | Index Systems, Inc. | Method for selectively playing back programs recorded on a video tape | 
| US5367621A              (en) | 1991-09-06 | 1994-11-22 | International Business Machines Corporation | Data processing method to provide a generalized link from a reference point in an on-line book to an arbitrary multimedia object which can be dynamically updated | 
| JPH06102822A              (en) | 1991-09-26 | 1994-04-15 | Rooreru Intelligent Syst:Kk | File security system | 
| US5355474A              (en) | 1991-09-27 | 1994-10-11 | Thuraisngham Bhavani M | System for multilevel secure database management using a knowledge base with release-based and other security constraints for query, response and update modification | 
| US5200999A              (en) | 1991-09-27 | 1993-04-06 | International Business Machines Corporation | Public key cryptosystem key management based on control vectors | 
| US5177788A              (en) | 1991-10-15 | 1993-01-05 | Ungermann-Bass, Inc. | Network message security method and apparatus | 
| US5164988A              (en) | 1991-10-31 | 1992-11-17 | International Business Machines Corporation | Method to establish and enforce a network cryptographic security policy in a public key cryptosystem | 
| US5265164A              (en) | 1991-10-31 | 1993-11-23 | International Business Machines Corporation | Cryptographic facility environment backup/restore and replication in a public key cryptosystem | 
| US5325370A              (en) | 1991-11-12 | 1994-06-28 | Storage Technology Corporation | Method and apparatus for recording data on magnetic tape media | 
| US5276901A              (en)* | 1991-12-16 | 1994-01-04 | International Business Machines Corporation | System for controlling group access to objects using group access control folder and group identification as individual user | 
| US5210795A              (en) | 1992-01-10 | 1993-05-11 | Digital Equipment Corporation | Secure user authentication from personal computer | 
| DK170490B1              (en) | 1992-04-28 | 1995-09-18 | Multi Inform As | Data Processing Plant | 
| FR2686755A1              (en) | 1992-01-28 | 1993-07-30 | Electricite De France | METHOD FOR ENCRYPTING MESSAGES TRANSMITTED BETWEEN INTERCONNECTED NETWORKS, ENCRYPTION APPARATUS AND DEVICE FOR COMMUNICATING ENCRYPTED DATA USING SUCH A METHOD. | 
| GB9205774D0              (en) | 1992-03-17 | 1992-04-29 | Int Computers Ltd | Computer security system | 
| US5333266A              (en) | 1992-03-27 | 1994-07-26 | International Business Machines Corporation | Method and apparatus for message handling in computer systems | 
| US5649095A              (en) | 1992-03-30 | 1997-07-15 | Cozza; Paul D. | Method and apparatus for detecting computer viruses through the use of a scan information cache | 
| US5278460A              (en) | 1992-04-07 | 1994-01-11 | Micron Technology, Inc. | Voltage compensating CMOS input buffer | 
| US5280527A              (en)* | 1992-04-14 | 1994-01-18 | Kamahira Safe Co., Inc. | Biometric token for authorizing access to a host system | 
| US5313521A              (en) | 1992-04-15 | 1994-05-17 | Fujitsu Limited | Key distribution protocol for file transfer in the local area network | 
| US5276735A              (en)* | 1992-04-17 | 1994-01-04 | Secure Computing Corporation | Data enclave and trusted path system | 
| US5315658B1              (en) | 1992-04-20 | 1995-09-12 | Silvio Micali | Fair cryptosystems and methods of use | 
| US5276737B1              (en)* | 1992-04-20 | 1995-09-12 | Silvio Micali | Fair cryptosystems and methods of use | 
| US5278901A              (en)* | 1992-04-30 | 1994-01-11 | International Business Machines Corporation | Pattern-oriented intrusion-detection system and method | 
| US5485409A              (en)* | 1992-04-30 | 1996-01-16 | International Business Machines Corporation | Automated penetration analysis system and method | 
| US5311593A              (en) | 1992-05-13 | 1994-05-10 | Chipcom Corporation | Security system for a network concentrator | 
| US5412717A              (en) | 1992-05-15 | 1995-05-02 | Fischer; Addison M. | Computer system security method and apparatus having program authorization information data structures | 
| US5241594A              (en) | 1992-06-02 | 1993-08-31 | Hughes Aircraft Company | One-time logon means and methods for distributed computing systems | 
| GB9212655D0              (en) | 1992-06-15 | 1992-07-29 | Digital Equipment Int | Communications system | 
| WO1993026109A1              (en) | 1992-06-17 | 1993-12-23 | The Trustees Of The University Of Pennsylvania | Apparatus for providing cryptographic support in a network | 
| US5359659A              (en) | 1992-06-19 | 1994-10-25 | Doren Rosenthal | Method for securing software against corruption by computer viruses | 
| GB9213169D0              (en) | 1992-06-22 | 1992-08-05 | Ncr Int Inc | Cryptographic key management apparatus and method | 
| US5235642A              (en) | 1992-07-21 | 1993-08-10 | Digital Equipment Corporation | Access control subsystem and method for distributed computer system using locally cached authentication credentials | 
| IL102843A              (en) | 1992-08-17 | 1996-06-18 | Zisapel Yehuda | Carrier sensing multiple access/collision detection local area networks | 
| US5418908A              (en) | 1992-10-15 | 1995-05-23 | International Business Machines Corporation | System for automatically establishing a link between an electronic mail item and a remotely stored reference through a place mark inserted into the item | 
| US5432932A              (en) | 1992-10-23 | 1995-07-11 | International Business Machines Corporation | System and method for dynamically controlling remote processes from a performance monitor | 
| JP3553987B2              (en)* | 1992-11-13 | 2004-08-11 | 株式会社日立製作所 | Client server system | 
| US5675733A              (en) | 1992-11-30 | 1997-10-07 | International Business Machines Corporation | Statistical analysis and display of reception status of electronic messages | 
| US5666530A              (en) | 1992-12-02 | 1997-09-09 | Compaq Computer Corporation | System for automatic synchronization of common file between portable computer and host computer via communication channel selected from a plurality of usable channels there between | 
| US5410326A              (en) | 1992-12-04 | 1995-04-25 | Goldstein; Steven W. | Programmable remote control device for interacting with a plurality of remotely controlled devices | 
| US5341426A              (en) | 1992-12-15 | 1994-08-23 | Motorola, Inc. | Cryptographic key management apparatus and method | 
| JPH08504326A              (en) | 1992-12-15 | 1996-05-14 | コモンウェルス  サイエンティフィック  アンド  インダストリアル  リサーチ  オーガナイゼーション | DNA molecule encoding an inducible plant promoter and tomato ADH2 enzyme | 
| US5828893A              (en) | 1992-12-24 | 1998-10-27 | Motorola, Inc. | System and method of communicating between trusted and untrusted computer systems | 
| US5544320A              (en) | 1993-01-08 | 1996-08-06 | Konrad; Allan M. | Remote information service access system based on a client-server-service model | 
| US5440723A              (en) | 1993-01-19 | 1995-08-08 | International Business Machines Corporation | Automatic immune system for computers and computer networks | 
| US5351293A              (en) | 1993-02-01 | 1994-09-27 | Wave Systems Corp. | System method and apparatus for authenticating an encrypted signal | 
| US5406557A              (en) | 1993-02-01 | 1995-04-11 | National Semiconductor Corporation | Interenterprise electronic mail hub | 
| US5586260A              (en) | 1993-02-12 | 1996-12-17 | Digital Equipment Corporation | Method and apparatus for authenticating a client to a server in computer systems which support different security mechanisms | 
| US5299263A              (en) | 1993-03-04 | 1994-03-29 | Bell Communications Research, Inc. | Two-way public key authentication and key agreement for low-cost terminals | 
| US5479411A              (en) | 1993-03-10 | 1995-12-26 | At&T Corp. | Multi-media integrated message arrangement | 
| US5414650A              (en) | 1993-03-24 | 1995-05-09 | Compression Research Group, Inc. | Parsing information onto packets using context-insensitive parsing rules based on packet characteristics | 
| US5404231A              (en) | 1993-05-24 | 1995-04-04 | Audiofax, Inc. | Sender-based facsimile store and forward facility | 
| FR2706652B1              (en) | 1993-06-09 | 1995-08-18 | Alsthom Cge Alcatel | Device for detecting intrusions and suspicious users for a computer system and security system comprising such a device. | 
| JPH0764788A              (en) | 1993-06-14 | 1995-03-10 | Mitsubishi Electric Corp | Microcomputer | 
| JPH0737087A              (en) | 1993-07-19 | 1995-02-07 | Matsushita Electric Ind Co Ltd | Image processing device | 
| JPH0779298A              (en) | 1993-09-08 | 1995-03-20 | Hitachi Ltd | Facsimile server system | 
| US5983012A              (en) | 1993-09-28 | 1999-11-09 | Bull Hn Information Systems Inc. | Executing programs of a first system on a second system | 
| US5436972A              (en) | 1993-10-04 | 1995-07-25 | Fischer; Addison M. | Method for preventing inadvertent betrayal by a trustee of escrowed digital secrets | 
| US5513126A              (en) | 1993-10-04 | 1996-04-30 | Xerox Corporation | Network having selectively accessible recipient prioritized communication channel profiles | 
| US5657461A              (en) | 1993-10-04 | 1997-08-12 | Xerox Corporation | User interface for defining and automatically transmitting data according to preferred communication channels | 
| US5414833A              (en) | 1993-10-27 | 1995-05-09 | International Business Machines Corporation | Network security system and method using a parallel finite state machine adaptive active monitor and responder | 
| US5371794A              (en) | 1993-11-02 | 1994-12-06 | Sun Microsystems, Inc. | Method and apparatus for privacy and authentication in wireless networks | 
| US5771354A              (en)* | 1993-11-04 | 1998-06-23 | Crawford; Christopher M. | Internet online backup system provides remote storage for customers using IDs and passwords which were interactively established when signing up for backup services | 
| US5499294A              (en) | 1993-11-24 | 1996-03-12 | The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration | Digital camera with apparatus for authentication of images produced from an image file | 
| FR2713419B1              (en) | 1993-12-02 | 1996-07-05 | Gemplus Card Int | Method for generating DSA signatures with low cost portable devices. | 
| AU1265195A              (en) | 1993-12-06 | 1995-06-27 | Telequip Corporation | Secure computer memory card | 
| DE69330065T2              (en) | 1993-12-08 | 2001-08-09 | International Business Machines Corp., Armonk | Method and system for key distribution and authentication in a data transmission system | 
| US5606668A              (en)* | 1993-12-15 | 1997-02-25 | Checkpoint Software Technologies Ltd. | System for securing inbound and outbound data packet flow in a computer network | 
| US5491750A              (en)* | 1993-12-30 | 1996-02-13 | International Business Machines Corporation | Method and apparatus for three-party entity authentication and key distribution using message authentication codes | 
| JPH09507729A              (en)* | 1994-01-13 | 1997-08-05 | バンカーズ・トラスト・カンパニー | Cryptographic system and method with key escrow function | 
| US5509074A              (en) | 1994-01-27 | 1996-04-16 | At&T Corp. | Method of protecting electronically published materials using cryptographic protocols | 
| US6381694B1              (en) | 1994-02-18 | 2002-04-30 | Apple Computer, Inc. | System for automatic recovery from software problems that cause computer failure | 
| US5557742A              (en) | 1994-03-07 | 1996-09-17 | Haystack Labs, Inc. | Method and system for detecting intrusion into and misuse of a data processing system | 
| US5974141A              (en) | 1995-03-31 | 1999-10-26 | Mitsubishi Corporation | Data management system | 
| US5572590A              (en) | 1994-04-12 | 1996-11-05 | International Business Machines Corporation | Discrimination of malicious changes to digital information using multiple signatures | 
| US5481613A              (en)* | 1994-04-15 | 1996-01-02 | Northern Telecom Limited | Computer network cryptographic key distribution system | 
| US5627977A              (en) | 1994-04-19 | 1997-05-06 | Orchid Systems, Inc. | Trainable user interface translator | 
| US5541993A              (en) | 1994-05-10 | 1996-07-30 | Fan; Eric | Structure and method for secure image transmission | 
| US5675507A              (en) | 1995-04-28 | 1997-10-07 | Bobo, Ii; Charles R. | Message storage and delivery system | 
| US5511122A              (en) | 1994-06-03 | 1996-04-23 | The United States Of America As Represented By The Secretary Of The Navy | Intermediate network authentication | 
| US5416842A              (en) | 1994-06-10 | 1995-05-16 | Sun Microsystems, Inc. | Method and apparatus for key-management scheme for use with internet protocols at site firewalls | 
| US5561703A              (en) | 1994-07-06 | 1996-10-01 | Rolm Company | System and method for integration of a paging server into a private branch exchange environment | 
| US5535276A              (en) | 1994-11-09 | 1996-07-09 | Bell Atlantic Network Services, Inc. | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography | 
| US5615340A              (en) | 1994-07-21 | 1997-03-25 | Allied Telesyn Int'l Corp. | Network interfacing apparatus and method using repeater and cascade interface with scrambling | 
| US5557346A              (en) | 1994-08-11 | 1996-09-17 | Trusted Information Systems, Inc. | System and method for key escrow encryption | 
| US5557765A              (en) | 1994-08-11 | 1996-09-17 | Trusted Information Systems, Inc. | System and method for data recovery | 
| US5537533A              (en) | 1994-08-11 | 1996-07-16 | Miralink Corporation | System and method for remote mirroring of digital data from a primary network server to a remote network server | 
| JPH10511471A              (en) | 1994-08-12 | 1998-11-04 | リートン,フランク、タムスン | Fail-safe key marking system | 
| US5485460A              (en)* | 1994-08-19 | 1996-01-16 | Microsoft Corporation | System and method for running multiple incompatible network protocol stacks | 
| US5604490A              (en)* | 1994-09-09 | 1997-02-18 | International Business Machines Corporation | Method and system for providing a user access to multiple secured subsystems | 
| US5481312A              (en)* | 1994-09-12 | 1996-01-02 | At&T Corp. | Method of and apparatus for the transmission of high and low priority segments of a video bitstream over packet networks | 
| US5548646A              (en) | 1994-09-15 | 1996-08-20 | Sun Microsystems, Inc. | System for signatureless transmission and reception of data packets between computer networks | 
| US5740231A              (en) | 1994-09-16 | 1998-04-14 | Octel Communications Corporation | Network-based multimedia communications and directory system and method of operation | 
| US5933478A              (en) | 1994-09-28 | 1999-08-03 | Hitachi, Ltd. | Data transfer system and handheld terminal device used therefor | 
| JPH0897159A              (en) | 1994-09-29 | 1996-04-12 | Handotai Process Kenkyusho:Kk | Method and system for epitaxial growth | 
| US5802371A              (en) | 1994-09-29 | 1998-09-01 | International Business Machines Corporation | Method of walking-up a call stack for a client/server program that uses remote procedure call | 
| US5864683A              (en)* | 1994-10-12 | 1999-01-26 | Secure Computing Corporartion | System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights | 
| GB2295299B              (en) | 1994-11-16 | 1999-04-28 | Network Services Inc Enterpris | Enterprise network management method and apparatus | 
| US5623601A              (en) | 1994-11-18 | 1997-04-22 | Milkway Networks Corporation | Apparatus and method for providing a secure gateway for communication and data exchanges between networks | 
| US5623598A              (en) | 1994-11-22 | 1997-04-22 | Hewlett-Packard Company | Method for identifying ways to improve performance in computer data storage systems | 
| US5805719A              (en) | 1994-11-28 | 1998-09-08 | Smarttouch | Tokenless identification of individuals | 
| US6154879A              (en) | 1994-11-28 | 2000-11-28 | Smarttouch, Inc. | Tokenless biometric ATM access system | 
| US5758257A              (en) | 1994-11-29 | 1998-05-26 | Herz; Frederick | System and method for scheduling broadcast of and access to video programs and other data using customer profiles | 
| US5619648A              (en) | 1994-11-30 | 1997-04-08 | Lucent Technologies Inc. | Message filtering techniques | 
| US5608874A              (en) | 1994-12-02 | 1997-03-04 | Autoentry Online, Inc. | System and method for automatic data file format translation and transmission having advanced features | 
| US5550984A              (en) | 1994-12-07 | 1996-08-27 | Matsushita Electric Corporation Of America | Security system for preventing unauthorized communications between networks by translating communications received in ip protocol to non-ip protocol to remove address and routing services information | 
| US5646997A              (en) | 1994-12-14 | 1997-07-08 | Barton; James M. | Method and apparatus for embedding authentication information within digital data | 
| US5530852A              (en) | 1994-12-20 | 1996-06-25 | Sun Microsystems, Inc. | Method for extracting profiles and topics from a first file written in a first markup language and generating files in different markup languages containing the profiles and topics for use in accessing data described by the profiles and topics | 
| US5566170A              (en) | 1994-12-29 | 1996-10-15 | Storage Technology Corporation | Method and apparatus for accelerated packet forwarding | 
| US5694616A              (en) | 1994-12-30 | 1997-12-02 | International Business Machines Corporation | Method and system for prioritization of email items by selectively associating priority attribute with at least one and fewer than all of the recipients | 
| US5638487A              (en) | 1994-12-30 | 1997-06-10 | Purespeech, Inc. | Automatic speech recognition | 
| US5878230A              (en) | 1995-01-05 | 1999-03-02 | International Business Machines Corporation | System for email messages wherein the sender designates whether the recipient replies or forwards to addresses also designated by the sender | 
| US5504454A              (en) | 1995-01-30 | 1996-04-02 | Westinghouse Elec. Corp. | Demodulator for powerline carrier communications | 
| US5583995A              (en) | 1995-01-30 | 1996-12-10 | Mrj, Inc. | Apparatus and method for data storage and retrieval using bandwidth allocation | 
| US6658568B1              (en) | 1995-02-13 | 2003-12-02 | Intertrust Technologies Corporation | Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management | 
| US5943422A              (en) | 1996-08-12 | 1999-08-24 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels | 
| US6272632B1              (en) | 1995-02-21 | 2001-08-07 | Network Associates, Inc. | System and method for controlling access to a user secret using a key recovery field | 
| US5835758A              (en) | 1995-02-28 | 1998-11-10 | Vidya Technologies, Inc. | Method and system for respresenting and processing physical and conceptual entities | 
| US5655081A              (en) | 1995-03-08 | 1997-08-05 | Bmc Software, Inc. | System for monitoring and managing computer resources and applications across a distributed computing environment using an intelligent autonomous agent architecture | 
| US5564106A              (en) | 1995-03-09 | 1996-10-08 | Motorola, Inc. | Method for providing blind access to an encryption key | 
| US5710883A              (en)* | 1995-03-10 | 1998-01-20 | Stanford University | Hypertext document transport mechanism for firewall-compatible distributed world-wide web publishing | 
| US5553145A              (en) | 1995-03-21 | 1996-09-03 | Micali; Silvia | Simultaneous electronic transactions with visible trusted parties | 
| US5699513A              (en) | 1995-03-31 | 1997-12-16 | Motorola, Inc. | Method for secure network access via message intercept | 
| US5790793A              (en) | 1995-04-04 | 1998-08-04 | Higley; Thomas | Method and system to create, transmit, receive and process information, including an address to further information | 
| IL113259A              (en)* | 1995-04-05 | 2001-03-19 | Diversinet Corp | Apparatus and method for safe communication handshake and data transfer | 
| US5677955A              (en) | 1995-04-07 | 1997-10-14 | Financial Services Technology Consortium | Electronic funds transfer instruments | 
| US5852665A              (en) | 1995-04-13 | 1998-12-22 | Fortress U & T Ltd. | Internationally regulated system for one to one cryptographic communications with national sovereignty without key escrow | 
| US5724512A              (en) | 1995-04-17 | 1998-03-03 | Lucent Technologies Inc. | Methods and apparatus for storage and retrieval of name space information in a distributed computing system | 
| DE69628882T2              (en) | 1995-04-25 | 2004-05-27 | Canon K.K. | Data transmission device and method | 
| US5790856A              (en) | 1995-05-08 | 1998-08-04 | Apple Computer, Inc. | Methods, apparatus, and data structures for data driven computer patches and static analysis of same | 
| JP3338585B2              (en)* | 1995-05-16 | 2002-10-28 | 富士通株式会社 | Apparatus and method for converting presentation data | 
| US5632011A              (en) | 1995-05-22 | 1997-05-20 | Sterling Commerce, Inc. | Electronic mail management system for operation on a host computer system | 
| KR19990022451A              (en) | 1995-06-05 | 1999-03-25 | 피터 씨. 프레운드 | Multilevel digital signature method and system | 
| US5812776A              (en) | 1995-06-07 | 1998-09-22 | Open Market, Inc. | Method of providing internet pages by mapping telephone number provided by client to URL and returning the same in a redirect command by server | 
| US5708780A              (en)* | 1995-06-07 | 1998-01-13 | Open Market, Inc. | Internet server access control and monitoring systems | 
| US5636371A              (en) | 1995-06-07 | 1997-06-03 | Bull Hn Information Systems Inc. | Virtual network mechanism to access well known port application programs running on a single host system | 
| US5689565A              (en) | 1995-06-29 | 1997-11-18 | Microsoft Corporation | Cryptography system and method for providing cryptographic services for a computer application | 
| US5761531A              (en) | 1995-06-30 | 1998-06-02 | Fujitsu Limited | Input/output control apparatus and method for transfering track data from cache module to channel unit during the staging of the data track from device adapter | 
| US5706507A              (en)* | 1995-07-05 | 1998-01-06 | International Business Machines Corporation | System and method for controlling access to data located on a content server | 
| GB2303947A              (en) | 1995-07-31 | 1997-03-05 | Ibm | Boot sector virus protection in computer systems | 
| JPH0954699A              (en) | 1995-08-11 | 1997-02-25 | Fujitsu Ltd | Computer process scheduler | 
| US5742759A              (en) | 1995-08-18 | 1998-04-21 | Sun Microsystems, Inc. | Method and system for facilitating access control to system resources in a distributed computer system | 
| EP0762337A3              (en) | 1995-09-08 | 2000-01-19 | Francotyp-Postalia Aktiengesellschaft & Co. | Method and device for enhancing manipulation-proof of critical data | 
| US5631961A              (en) | 1995-09-15 | 1997-05-20 | The United States Of America As Represented By The Director Of The National Security Agency | Device for and method of cryptography that allows third party access | 
| US6134551A              (en) | 1995-09-15 | 2000-10-17 | Intel Corporation | Method of caching digital certificate revocation lists | 
| US5889943A              (en) | 1995-09-26 | 1999-03-30 | Trend Micro Incorporated | Apparatus and method for electronic mail virus detection and elimination | 
| US5623600A              (en) | 1995-09-26 | 1997-04-22 | Trend Micro, Incorporated | Virus detection and removal apparatus for computer networks | 
| US5854916A              (en) | 1995-09-28 | 1998-12-29 | Symantec Corporation | State-based cache for antivirus software | 
| US5765030A              (en) | 1996-07-19 | 1998-06-09 | Symantec Corp | Processor emulator module having a variable pre-fetch queue size for program execution | 
| US5826013A              (en) | 1995-09-28 | 1998-10-20 | Symantec Corporation | Polymorphic virus detection module | 
| US6067410A              (en) | 1996-02-09 | 2000-05-23 | Symantec Corporation | Emulation repair system | 
| US5696822A              (en) | 1995-09-28 | 1997-12-09 | Symantec Corporation | Polymorphic virus detection module | 
| US6766450B2              (en) | 1995-10-24 | 2004-07-20 | Corestreet, Ltd. | Certificate revocation system | 
| US6487658B1              (en) | 1995-10-02 | 2002-11-26 | Corestreet Security, Ltd. | Efficient certificate revocation | 
| US5717758A              (en)* | 1995-11-02 | 1998-02-10 | Micall; Silvio | Witness-based certificate revocation system | 
| US5793868A              (en) | 1996-08-29 | 1998-08-11 | Micali; Silvio | Certificate revocation system | 
| US5666416A              (en) | 1995-10-24 | 1997-09-09 | Micali; Silvio | Certificate revocation system | 
| US5717757A              (en)* | 1996-08-29 | 1998-02-10 | Micali; Silvio | Certificate issue lists | 
| US6097811A              (en) | 1995-11-02 | 2000-08-01 | Micali; Silvio | Tree-based certificate revocation system | 
| US5859966A              (en)* | 1995-10-10 | 1999-01-12 | Data General Corporation | Security system for computer systems | 
| US5572643A              (en) | 1995-10-19 | 1996-11-05 | Judson; David H. | Web browser with dynamic display of information objects during linking | 
| US5689566A              (en) | 1995-10-24 | 1997-11-18 | Nguyen; Minhtam C. | Network with secure communications sessions | 
| US5687235A              (en) | 1995-10-26 | 1997-11-11 | Novell, Inc. | Certificate revocation performance optimization | 
| US5948062A              (en) | 1995-10-27 | 1999-09-07 | Emc Corporation | Network file server using a cached disk array storing a network file directory including file locking information and data mover computers each having file system software for shared read-write file access | 
| US5826029A              (en) | 1995-10-31 | 1998-10-20 | International Business Machines Corporation | Secured gateway interface | 
| US5724428A              (en) | 1995-11-01 | 1998-03-03 | Rsa Data Security, Inc. | Block encryption algorithm with data-dependent rotations | 
| US5793763A              (en) | 1995-11-03 | 1998-08-11 | Cisco Technology, Inc. | Security system for network address translation systems | 
| US5923846A              (en) | 1995-11-06 | 1999-07-13 | Microsoft Corporation | Method of uploading a message containing a file reference to a server and downloading a file from the server using the file reference | 
| US5764906A              (en) | 1995-11-07 | 1998-06-09 | Netword Llc | Universal electronic resource denotation, request and delivery system | 
| US5699431A              (en) | 1995-11-13 | 1997-12-16 | Northern Telecom Limited | Method for efficient management of certificate revocation lists and update information | 
| US5671279A              (en) | 1995-11-13 | 1997-09-23 | Netscape Communications Corporation | Electronic commerce using a secure courier system | 
| JPH09153050A              (en) | 1995-11-29 | 1997-06-10 | Hitachi Ltd | Document information collecting method and document information collecting device | 
| JP3688830B2              (en) | 1995-11-30 | 2005-08-31 | 株式会社東芝 | Packet transfer method and packet processing apparatus | 
| US5812844A              (en) | 1995-12-07 | 1998-09-22 | Microsoft Corporation | Method and system for scheduling the execution of threads using optional time-specific scheduling constraints | 
| US5937164A              (en) | 1995-12-07 | 1999-08-10 | Hyperlock Technologies, Inc. | Method and apparatus of secure server control of local media via a trigger through a network for instant local access of encrypted data on local media within a platform independent networking system | 
| US5892825A              (en) | 1996-05-15 | 1999-04-06 | Hyperlock Technologies Inc | Method of secure server control of local media via a trigger through a network for instant local access of encrypted data on local media | 
| US5758343A              (en) | 1995-12-08 | 1998-05-26 | Ncr Corporation | Apparatus and method for integrating multiple delegate directory service agents | 
| US5745574A              (en) | 1995-12-15 | 1998-04-28 | Entegrity Solutions Corporation | Security infrastructure for electronic transactions | 
| US5793954A              (en) | 1995-12-20 | 1998-08-11 | Nb Networks | System and method for general purpose network analysis | 
| US5706442A              (en)* | 1995-12-20 | 1998-01-06 | Block Financial Corporation | System for on-line financial services using distributed objects | 
| US5781901A              (en) | 1995-12-21 | 1998-07-14 | Intel Corporation | Transmitting electronic mail attachment over a network using a e-mail page | 
| US5903723A              (en) | 1995-12-21 | 1999-05-11 | Intel Corporation | Method and apparatus for transmitting electronic mail attachments with attachment references | 
| US5602918A              (en)* | 1995-12-22 | 1997-02-11 | Virtual Open Network Environment Corp. | Application level security system and method | 
| JP2000503154A              (en) | 1996-01-11 | 2000-03-14 | エムアールジェイ  インコーポレイテッド | System for controlling access and distribution of digital ownership | 
| US5801700A              (en) | 1996-01-19 | 1998-09-01 | Silicon Graphics Incorporated | System and method for an iconic drag and drop interface for electronic file transfer | 
| US5898830A              (en) | 1996-10-17 | 1999-04-27 | Network Engineering Software | Firewall providing enhanced network security and user transparency | 
| US5826014A              (en) | 1996-02-06 | 1998-10-20 | Network Engineering Software | Firewall system for protecting network elements connected to a public network | 
| JP3165366B2              (en) | 1996-02-08 | 2001-05-14 | 株式会社日立製作所 | Network security system | 
| US6587949B1              (en) | 1998-06-26 | 2003-07-01 | Fotonation Holdings, Llc | Secure storage device for transfer of data via removable storage | 
| US5855020A              (en) | 1996-02-21 | 1998-12-29 | Infoseek Corporation | Web scan process | 
| US5963915A              (en) | 1996-02-21 | 1999-10-05 | Infoseek Corporation | Secure, convenient and efficient system and method of performing trans-internet purchase transactions | 
| US5751956A              (en) | 1996-02-21 | 1998-05-12 | Infoseek Corporation | Method and apparatus for redirection of server external hyper-link references | 
| US5790664A              (en) | 1996-02-26 | 1998-08-04 | Network Engineering Software, Inc. | Automated system for management of licensed software | 
| US20010011253A1              (en) | 1998-08-04 | 2001-08-02 | Christopher D. Coley | Automated system for management of licensed software | 
| US6075863A              (en) | 1996-02-28 | 2000-06-13 | Encanto Networks | Intelligent communication device | 
| US5862325A              (en)* | 1996-02-29 | 1999-01-19 | Intermind Corporation | Computer-based communication system and method using metadata defining a control structure | 
| US5768388A              (en) | 1996-03-01 | 1998-06-16 | Goldwasser; Shafi | Time delayed key escrow | 
| US5684951A              (en) | 1996-03-20 | 1997-11-04 | Synopsys, Inc. | Method and system for user authorization over a multi-user computer system | 
| US5673322A              (en) | 1996-03-22 | 1997-09-30 | Bell Communications Research, Inc. | System and method for providing protocol translation and filtering to access the world wide web from wireless or low-bandwidth networks | 
| US5850442A              (en) | 1996-03-26 | 1998-12-15 | Entegrity Solutions Corporation | Secure world wide electronic commerce over an open network | 
| US5826022A              (en) | 1996-04-05 | 1998-10-20 | Sun Microsystems, Inc. | Method and apparatus for receiving electronic mail | 
| US5815573A              (en) | 1996-04-10 | 1998-09-29 | International Business Machines Corporation | Cryptographic key recovery system | 
| US5727156A              (en) | 1996-04-10 | 1998-03-10 | Hotoffice Technologies, Inc. | Internet-based automatic publishing system | 
| US5845084A              (en) | 1996-04-18 | 1998-12-01 | Microsoft Corporation | Automatic data display formatting with a networking application | 
| US5778372A              (en) | 1996-04-18 | 1998-07-07 | Microsoft Corporation | Remote retrieval and display management of electronic document with incorporated images | 
| US5815657A              (en) | 1996-04-26 | 1998-09-29 | Verifone, Inc. | System, method and article of manufacture for network electronic authorization utilizing an authorization instrument | 
| US5864852A              (en)* | 1996-04-26 | 1999-01-26 | Netscape Communications Corporation | Proxy server caching mechanism that provides a file directory structure and a mapping mechanism within the file directory structure | 
| US5842216A              (en) | 1996-05-03 | 1998-11-24 | Mitsubishi Electric Information Technology Center America, Inc. | System for sending small positive data notification messages over a network to indicate that a recipient node should obtain a particular version of a particular data item | 
| US5793972A              (en) | 1996-05-03 | 1998-08-11 | Westminster International Computers Inc. | System and method providing an interactive response to direct mail by creating personalized web page based on URL provided on mail piece | 
| US5742769A              (en) | 1996-05-06 | 1998-04-21 | Banyan Systems, Inc. | Directory with options for access to and display of email addresses | 
| US5903651A              (en) | 1996-05-14 | 1999-05-11 | Valicert, Inc. | Apparatus and method for demonstrating and confirming the status of a digital certificates and other data | 
| US5884033A              (en) | 1996-05-15 | 1999-03-16 | Spyglass, Inc. | Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering actions | 
| US6085320A              (en) | 1996-05-15 | 2000-07-04 | Rsa Security Inc. | Client/server protocol for proving authenticity | 
| US5768528A              (en) | 1996-05-24 | 1998-06-16 | V-Cast, Inc. | Client-server system for delivery of online information | 
| US6092067A              (en) | 1996-05-30 | 2000-07-18 | Microsoft Corporation | Desktop information manager for recording and viewing important events data structure | 
| US5918013A              (en) | 1996-06-03 | 1999-06-29 | Webtv Networks, Inc. | Method of transcoding documents in a network environment using a proxy server | 
| US5822526A              (en) | 1996-06-03 | 1998-10-13 | Microsoft Corporation | System and method for maintaining and administering email address names in a network | 
| US6151643A              (en) | 1996-06-07 | 2000-11-21 | Networks Associates, Inc. | Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer | 
| CA2257309C              (en) | 1996-06-07 | 2002-06-11 | At&T Corp. | Internet file system | 
| US5812398A              (en) | 1996-06-10 | 1998-09-22 | Sun Microsystems, Inc. | Method and system for escrowed backup of hotelled world wide web sites | 
| US6108688A              (en) | 1996-06-12 | 2000-08-22 | Sun Microsystems, Inc. | System for reminding a sender of an email if recipient of the email does not respond by a selected time set by the sender | 
| US6178509B1              (en)* | 1996-06-13 | 2001-01-23 | Intel Corporation | Tamper resistant methods and apparatus | 
| US6373950B1              (en) | 1996-06-17 | 2002-04-16 | Hewlett-Packard Company | System, method and article of manufacture for transmitting messages within messages utilizing an extensible, flexible architecture | 
| US5798706A              (en) | 1996-06-18 | 1998-08-25 | Raptor Systems, Inc. | Detecting unauthorized network communication | 
| US5901227A              (en) | 1996-06-20 | 1999-05-04 | Novell, Inc. | Method and apparatus for implementing partial and complete optional key escrow | 
| US5991807A              (en) | 1996-06-24 | 1999-11-23 | Nortel Networks Corporation | System for controlling users access to a distributive network in accordance with constraints present in common access distributive network interface separate from a server | 
| US5781857A              (en) | 1996-06-28 | 1998-07-14 | Motorola, Inc. | Method of establishing an email monitor responsive to a wireless communications system user | 
| JP3531367B2              (en) | 1996-07-04 | 2004-05-31 | 株式会社日立製作所 | Translator | 
| US5796830A              (en) | 1996-07-29 | 1998-08-18 | International Business Machines Corporation | Interoperable cryptographic key recovery system | 
| US5828832A              (en) | 1996-07-30 | 1998-10-27 | Itt Industries, Inc. | Mixed enclave operation in a computer network with multi-level network security | 
| US5802178A              (en) | 1996-07-30 | 1998-09-01 | Itt Industries, Inc. | Stand alone device for providing security within computer networks | 
| US5790789A              (en) | 1996-08-02 | 1998-08-04 | Suarez; Larry | Method and architecture for the creation, control and deployment of services within a distributed computer environment | 
| US5872931A              (en)* | 1996-08-13 | 1999-02-16 | Veritas Software, Corp. | Management agent automatically executes corrective scripts in accordance with occurrences of specified events regardless of conditions of management interface and management engine | 
| US5711348A              (en)* | 1996-08-14 | 1998-01-27 | Moog Inc. | Hot gas control valve | 
| US5907620A              (en) | 1996-08-23 | 1999-05-25 | Cheyenne Property Trust | Method and apparatus for enforcing the use of cryptography in an international cryptography framework | 
| US5799083A              (en) | 1996-08-26 | 1998-08-25 | Brothers; Harlan Jay | Event verification system | 
| US5832208A              (en) | 1996-09-05 | 1998-11-03 | Cheyenne Software International Sales Corp. | Anti-virus agent for use with databases and mail servers | 
| US5892903A              (en) | 1996-09-12 | 1999-04-06 | Internet Security Systems, Inc. | Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system | 
| US5950195A              (en) | 1996-09-18 | 1999-09-07 | Secure Computing Corporation | Generalized security policy management system and method | 
| US6072942A              (en) | 1996-09-18 | 2000-06-06 | Secure Computing Corporation | System and method of electronic mail filtering using interconnected nodes | 
| US5951698A              (en) | 1996-10-02 | 1999-09-14 | Trend Micro, Incorporated | System, apparatus and method for the detection and removal of viruses in macros | 
| US5937066A              (en) | 1996-10-02 | 1999-08-10 | International Business Machines Corporation | Two-phase cryptographic key recovery system | 
| JPH10111727A              (en) | 1996-10-03 | 1998-04-28 | Toshiba Corp | Information equipment having telephone function and method for realizing security of the information equipment | 
| US6012144A              (en)* | 1996-10-08 | 2000-01-04 | Pickett; Thomas E. | Transaction security method and apparatus | 
| US5835090A              (en) | 1996-10-16 | 1998-11-10 | Etma, Inc. | Desktop manager for graphical user interface based system with enhanced desktop | 
| US5930479A              (en) | 1996-10-21 | 1999-07-27 | At&T Corp | Communications addressing system | 
| US6502191B1              (en) | 1997-02-14 | 2002-12-31 | Tumbleweed Communications Corp. | Method and system for binary data firewall delivery | 
| US6385655B1              (en) | 1996-10-24 | 2002-05-07 | Tumbleweed Communications Corp. | Method and apparatus for delivering documents over an electronic network | 
| US6119137A              (en) | 1997-01-30 | 2000-09-12 | Tumbleweed Communications Corp. | Distributed dynamic document conversion server | 
| US6192407B1              (en) | 1996-10-24 | 2001-02-20 | Tumbleweed Communications Corp. | Private, trackable URLs for directed document delivery | 
| US5790790A              (en) | 1996-10-24 | 1998-08-04 | Tumbleweed Software Corporation | Electronic document delivery system in which notification of said electronic document is sent to a recipient thereof | 
| AU5094398A              (en) | 1996-10-30 | 1998-05-22 | Theodor Holm Nelson | Many-to-many payment system for network content materials | 
| US5923885A              (en) | 1996-10-31 | 1999-07-13 | Sun Microsystems, Inc. | Acquisition and operation of remotely loaded software using applet modification of browser software | 
| US6453345B2              (en) | 1996-11-06 | 2002-09-17 | Datadirect Networks, Inc. | Network security and surveillance system | 
| US5991881A              (en) | 1996-11-08 | 1999-11-23 | Harris Corporation | Network surveillance system | 
| US6167520A              (en) | 1996-11-08 | 2000-12-26 | Finjan Software, Inc. | System and method for protecting a client during runtime from hostile downloadables | 
| US6154844A              (en) | 1996-11-08 | 2000-11-28 | Finjan Software, Ltd. | System and method for attaching a downloadable security profile to a downloadable | 
| US5796948A              (en) | 1996-11-12 | 1998-08-18 | Cohen; Elliot D. | Offensive message interceptor for computers | 
| US5872844A              (en)* | 1996-11-18 | 1999-02-16 | Microsoft Corporation | System and method for detecting fraudulent expenditure of transferable electronic assets | 
| US5796942A              (en) | 1996-11-21 | 1998-08-18 | Computer Associates International, Inc. | Method and apparatus for automated network-wide surveillance and security breach intervention | 
| JPH10164124A              (en) | 1996-12-04 | 1998-06-19 | Canon Inc | Communication device | 
| US6367012B1              (en) | 1996-12-06 | 2002-04-02 | Microsoft Corporation | Embedding certifications in executable files for network transmission | 
| US5892904A              (en) | 1996-12-06 | 1999-04-06 | Microsoft Corporation | Code certification for network transmission | 
| US5968119A              (en) | 1996-12-09 | 1999-10-19 | Wall Data Incorporated | Method of accessing information of an SNA host computer from a client computer using a specific terminal emulation | 
| US5959976A              (en) | 1996-12-09 | 1999-09-28 | Kuo; Yung-Tien | Method and device for filtering transmission | 
| US6285991B1              (en) | 1996-12-13 | 2001-09-04 | Visa International Service Association | Secure interactive electronic account statement delivery system | 
| US6009274A              (en) | 1996-12-13 | 1999-12-28 | 3Com Corporation | Method and apparatus for automatically updating software components on end systems over a network | 
| US5903882A              (en) | 1996-12-13 | 1999-05-11 | Certco, Llc | Reliance server for electronic transaction system | 
| JP2000507791A              (en) | 1996-12-16 | 2000-06-20 | サムスン  エレクトロニクス  カンパニー  リミテッド | Method and apparatus for transmitting an e-mail message in a local network | 
| US5911776A              (en) | 1996-12-18 | 1999-06-15 | Unisys Corporation | Automatic format conversion system and publishing methodology for multi-user network | 
| US6061722A              (en) | 1996-12-23 | 2000-05-09 | T E Network, Inc. | Assessing network performance without interference with normal network operations | 
| US5951644A              (en) | 1996-12-24 | 1999-09-14 | Apple Computer, Inc. | System for predicting and managing network performance by managing and monitoring resourse utilization and connection of network | 
| US5907618A              (en) | 1997-01-03 | 1999-05-25 | International Business Machines Corporation | Method and apparatus for verifiably providing key recovery information in a cryptographic system | 
| US5805801A              (en) | 1997-01-09 | 1998-09-08 | International Business Machines Corporation | System and method for detecting and preventing security | 
| US5898836A              (en) | 1997-01-14 | 1999-04-27 | Netmind Services, Inc. | Change-detection tool indicating degree and location of change of internet documents by comparison of cyclic-redundancy-check(CRC) signatures | 
| US5933647A              (en) | 1997-01-24 | 1999-08-03 | Cognet Corporation | System and method for software distribution and desktop management in a computer network environment | 
| US5978799A              (en) | 1997-01-30 | 1999-11-02 | Hirsch; G. Scott | Search engine including query database, user profile database, information templates and email facility | 
| US5956481A              (en) | 1997-02-06 | 1999-09-21 | Microsoft Corporation | Method and apparatus for protecting data files on a computer from virus infection | 
| EP0858184A3              (en)* | 1997-02-07 | 1999-09-01 | Nds Limited | Digital recording protection system | 
| US5953502A              (en) | 1997-02-13 | 1999-09-14 | Helbig, Sr.; Walter A | Method and apparatus for enhancing computer system security | 
| JPH10232875A              (en) | 1997-02-19 | 1998-09-02 | Hitachi Ltd | Database management method and parallel database management system | 
| US5896499A              (en) | 1997-02-21 | 1999-04-20 | International Business Machines Corporation | Embedded security processor | 
| US5920630A              (en) | 1997-02-25 | 1999-07-06 | United States Of America | Method of public key cryptography that includes key escrow | 
| US5922074A              (en) | 1997-02-28 | 1999-07-13 | Xcert Software, Inc. | Method of and apparatus for providing secure distributed directory services and public key infrastructure | 
| US6408336B1              (en) | 1997-03-10 | 2002-06-18 | David S. Schneider | Distributed administration of access to information | 
| GB2324892B              (en) | 1997-03-14 | 1999-12-01 | Interactuality Limited | Process monitoring system | 
| US5960170A              (en) | 1997-03-18 | 1999-09-28 | Trend Micro, Inc. | Event triggered iterative virus detection | 
| US5987606A              (en) | 1997-03-19 | 1999-11-16 | Bascom Global Internet Services, Inc. | Method and system for content filtering information retrieved from an internet computer network | 
| US5958010A              (en) | 1997-03-20 | 1999-09-28 | Firstsense Software, Inc. | Systems and methods for monitoring distributed applications including an interface running in an operating system kernel | 
| US5996011A              (en) | 1997-03-25 | 1999-11-30 | Unified Research Laboratories, Inc. | System and method for filtering data received by a computer system | 
| US6539430B1              (en) | 1997-03-25 | 2003-03-25 | Symantec Corporation | System and method for filtering data received by a computer system | 
| US6304904B1              (en) | 1997-03-27 | 2001-10-16 | Intel Corporation | Method and apparatus for collecting page-level performance statistics from a network device | 
| EP1021917A4              (en) | 1997-03-31 | 2002-05-15 | Broadband Associates | Method and system for providing a presentation on a network | 
| US6061448A              (en) | 1997-04-01 | 2000-05-09 | Tumbleweed Communications Corp. | Method and system for dynamic server document encryption | 
| US6249585B1              (en) | 1998-04-08 | 2001-06-19 | Network Associates, Inc | Publicly verifiable key recovery | 
| US5964889A              (en) | 1997-04-16 | 1999-10-12 | Symantec Corporation | Method to analyze a program for presence of computer viruses by examining the opcode for faults before emulating instruction in emulator | 
| US6243815B1              (en) | 1997-04-25 | 2001-06-05 | Anand K. Antur | Method and apparatus for reconfiguring and managing firewalls and security devices | 
| US6108786A              (en) | 1997-04-25 | 2000-08-22 | Intel Corporation | Monitor network bindings for computer security | 
| US6123737A              (en) | 1997-05-21 | 2000-09-26 | Symantec Corporation | Push deployment of software packages using notification transports | 
| US6167438A              (en) | 1997-05-22 | 2000-12-26 | Trustees Of Boston University | Method and system for distributed caching, prefetching and replication | 
| US5948104A              (en) | 1997-05-23 | 1999-09-07 | Neuromedical Systems, Inc. | System and method for automated anti-viral file update | 
| TW338865B              (en)* | 1997-06-03 | 1998-08-21 | Philips Eloctronics N V | Authentication system | 
| US6314190B1              (en) | 1997-06-06 | 2001-11-06 | Networks Associates Technology, Inc. | Cryptographic system with methods for user-controlled message recovery | 
| US6070243A              (en) | 1997-06-13 | 2000-05-30 | Xylan Corporation | Deterministic user authentication service for communication network | 
| US5996077A              (en) | 1997-06-16 | 1999-11-30 | Cylink Corporation | Access control system and method using hierarchical arrangement of security devices | 
| US6009462A              (en) | 1997-06-16 | 1999-12-28 | Digital Equipment Corporation | Replacing large bit component of electronic mail (e-mail) message with hot-link in distributed computer system | 
| US6449640B1              (en) | 1997-06-19 | 2002-09-10 | International Business Machines Corporation | Web server with unique identification of linked objects | 
| US6226666B1              (en) | 1997-06-27 | 2001-05-01 | International Business Machines Corporation | Agent-based management system having an open layered architecture for synchronous and/or asynchronous messaging handling | 
| US6144744A              (en) | 1997-06-30 | 2000-11-07 | International Business Machines Corporation | Method and apparatus for the secure transfer of objects between cryptographic processors | 
| US6453352B1              (en) | 1997-07-14 | 2002-09-17 | Electronic Data Systems Corporation | Integrated electronic commerce system and method | 
| US6230194B1              (en) | 1997-07-14 | 2001-05-08 | Freegate Corporation | Upgrading a secure network interface | 
| US5958005A              (en) | 1997-07-17 | 1999-09-28 | Bell Atlantic Network Services, Inc. | Electronic mail security | 
| US7127741B2              (en) | 1998-11-03 | 2006-10-24 | Tumbleweed Communications Corp. | Method and system for e-mail message transmission | 
| US7117358B2              (en)* | 1997-07-24 | 2006-10-03 | Tumbleweed Communications Corp. | Method and system for filtering communication | 
| DE69841210D1              (en) | 1997-07-24 | 2009-11-12 | Axway Inc | Email Firewall | 
| US20050081059A1              (en)* | 1997-07-24 | 2005-04-14 | Bandini Jean-Christophe Denis | Method and system for e-mail filtering | 
| US7162738B2              (en) | 1998-11-03 | 2007-01-09 | Tumbleweed Communications Corp. | E-mail firewall with stored key encryption/decryption | 
| US5941998A              (en) | 1997-07-25 | 1999-08-24 | Samsung Electronics Co., Ltd. | Disk drive incorporating read-verify after write method | 
| US6073140A              (en) | 1997-07-29 | 2000-06-06 | Acxiom Corporation | Method and system for the creation, enhancement and update of remote data using persistent keys | 
| US5946679A              (en) | 1997-07-31 | 1999-08-31 | Torrent Networking Technologies, Corp. | System and method for locating a route in a route table using hashing and compressed radix tree searching | 
| US5919257A              (en) | 1997-08-08 | 1999-07-06 | Novell, Inc. | Networked workstation intrusion detection system | 
| US6006329A              (en) | 1997-08-11 | 1999-12-21 | Symantec Corporation | Detection of computer viruses spanning multiple data streams | 
| US5999967A              (en)* | 1997-08-17 | 1999-12-07 | Sundsted; Todd | Electronic mail filtering by electronic stamp | 
| US6199102B1              (en) | 1997-08-26 | 2001-03-06 | Christopher Alan Cobb | Method and system for filtering electronic messages | 
| US6442688B1              (en) | 1997-08-29 | 2002-08-27 | Entrust Technologies Limited | Method and apparatus for obtaining status of public key certificate updates | 
| US6357008B1              (en) | 1997-09-23 | 2002-03-12 | Symantec Corporation | Dynamic heuristic method for detecting computer viruses using decryption exploration and evaluation phases | 
| US6385644B1              (en) | 1997-09-26 | 2002-05-07 | Mci Worldcom, Inc. | Multi-threaded web based user inbox for report management | 
| US6119230A              (en) | 1997-10-01 | 2000-09-12 | Novell, Inc. | Distributed dynamic security capabilities | 
| US6185678B1              (en)* | 1997-10-02 | 2001-02-06 | Trustees Of The University Of Pennsylvania | Secure and reliable bootstrap architecture | 
| US6055519A              (en) | 1997-10-11 | 2000-04-25 | I2 Technologies, Inc. | Framework for negotiation and tracking of sale of goods | 
| US5991879A              (en) | 1997-10-23 | 1999-11-23 | Bull Hn Information Systems Inc. | Method for gradual deployment of user-access security within a data processing system | 
| US6393568B1              (en) | 1997-10-23 | 2002-05-21 | Entrust Technologies Limited | Encryption and decryption system and method with content analysis provision | 
| US6496979B1              (en) | 1997-10-24 | 2002-12-17 | Microsoft Corporation | System and method for managing application installation for a mobile device | 
| US6092102A              (en) | 1997-10-24 | 2000-07-18 | University Of Pittsburgh Of The Commonwealth System Of Higher Education | System and method for notifying users about information or events of an enterprise | 
| US6092201A              (en) | 1997-10-24 | 2000-07-18 | Entrust Technologies | Method and apparatus for extending secure communication operations via a shared list | 
| US6223172B1              (en) | 1997-10-31 | 2001-04-24 | Nortel Networks Limited | Address routing using address-sensitive mask decimation scheme | 
| US6119231A              (en) | 1997-10-31 | 2000-09-12 | Cisco Technologies, Inc. | Data scanning network security technique | 
| US6275937B1              (en) | 1997-11-06 | 2001-08-14 | International Business Machines Corporation | Collaborative server processing of content and meta-information with application to virus checking in a server network | 
| US6112181A              (en) | 1997-11-06 | 2000-08-29 | Intertrust Technologies Corporation | Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information | 
| US6362836B1              (en) | 1998-04-06 | 2002-03-26 | The Santa Cruz Operation, Inc. | Universal application server for providing applications on a variety of client devices in a client/server network | 
| US6119165A              (en) | 1997-11-17 | 2000-09-12 | Trend Micro, Inc. | Controlled distribution of application programs in a computer network | 
| US6003027A              (en) | 1997-11-21 | 1999-12-14 | International Business Machines Corporation | System and method for determining confidence levels for the results of a categorization system | 
| US6021510A              (en)* | 1997-11-24 | 2000-02-01 | Symantec Corporation | Antivirus accelerator | 
| US6094731A              (en) | 1997-11-24 | 2000-07-25 | Symantec Corporation | Antivirus accelerator for computer networks | 
| US6393465B2              (en)* | 1997-11-25 | 2002-05-21 | Nixmail Corporation | Junk electronic mail detector and eliminator | 
| US5860068A              (en)* | 1997-12-04 | 1999-01-12 | Petabyte Corporation | Method and system for custom manufacture and delivery of a data product | 
| JPH11175329A              (en) | 1997-12-08 | 1999-07-02 | Hitachi Ltd | Application cooperation method and device | 
| US6202157B1              (en) | 1997-12-08 | 2001-03-13 | Entrust Technologies Limited | Computer network security system and method having unilateral enforceable security policy provision | 
| US7055173B1              (en) | 1997-12-19 | 2006-05-30 | Avaya Technology Corp. | Firewall pooling in a network flowswitch | 
| US6023723A              (en)* | 1997-12-22 | 2000-02-08 | Accepted Marketing, Inc. | Method and system for filtering unwanted junk e-mail utilizing a plurality of filtering mechanisms | 
| US6009103A              (en) | 1997-12-23 | 1999-12-28 | Mediaone Group, Inc. | Method and system for automatic allocation of resources in a network | 
| US6052709A              (en)* | 1997-12-23 | 2000-04-18 | Bright Light Technologies, Inc. | Apparatus and method for controlling delivery of unsolicited electronic mail | 
| US6694023B1              (en) | 1997-12-29 | 2004-02-17 | Samsung Electronics Co., Ltd. | Method and apparatus for protecting copyright of digital recording medium and copyright protected digital recording medium | 
| US6088803A              (en) | 1997-12-30 | 2000-07-11 | Intel Corporation | System for virus-checking network data during download to a client device | 
| US6029256A              (en)* | 1997-12-31 | 2000-02-22 | Network Associates, Inc. | Method and system for allowing computer programs easy access to features of a virus scanning engine | 
| US6035423A              (en) | 1997-12-31 | 2000-03-07 | Network Associates, Inc. | Method and system for providing automated updating and upgrading of antivirus applications using a computer network | 
| US6279133B1              (en) | 1997-12-31 | 2001-08-21 | Kawasaki Steel Corporation | Method and apparatus for significantly improving the reliability of multilevel memory architecture | 
| US6088804A              (en) | 1998-01-12 | 2000-07-11 | Motorola, Inc. | Adaptive system and method for responding to computer network security attacks | 
| US5999932A              (en) | 1998-01-13 | 1999-12-07 | Bright Light Technologies, Inc. | System and method for filtering unsolicited electronic mail messages using data matching and heuristic processing | 
| US6138254A              (en) | 1998-01-22 | 2000-10-24 | Micron Technology, Inc. | Method and apparatus for redundant location addressing using data compression | 
| CA2228687A1              (en) | 1998-02-04 | 1999-08-04 | Brett Howard | Secured virtual private networks | 
| US6385596B1              (en) | 1998-02-06 | 2002-05-07 | Liquid Audio, Inc. | Secure online music distribution system | 
| SE513828C2              (en)* | 1998-07-02 | 2000-11-13 | Effnet Group Ab | Firewall device and method for controlling network data packet traffic between internal and external networks | 
| US5987610A              (en) | 1998-02-12 | 1999-11-16 | Ameritech Corporation | Computer virus screening methods and systems | 
| US6233577B1              (en) | 1998-02-17 | 2001-05-15 | Phone.Com, Inc. | Centralized certificate management system for two-way interactive communication devices in data networks | 
| ATE484054T1              (en) | 1998-02-27 | 2010-10-15 | Doug Carson & Associates Inc | INDIVIDUAL SETTING OF PIT AND LAND CROSSING POINTS IN AN OPTICAL DRIVE MASTER PROCESS | 
| US6026414A              (en)* | 1998-03-05 | 2000-02-15 | International Business Machines Corporation | System including a proxy client to backup files in a distributed computing environment | 
| US6279113B1              (en) | 1998-03-16 | 2001-08-21 | Internet Tools, Inc. | Dynamic signature inspection-based network intrusion detection | 
| US6134550A              (en) | 1998-03-18 | 2000-10-17 | Entrust Technologies Limited | Method and apparatus for use in determining validity of a certificate in a communication system employing trusted paths | 
| US6738814B1              (en) | 1998-03-18 | 2004-05-18 | Cisco Technology, Inc. | Method for blocking denial of service and address spoofing attacks on a private network | 
| US6182226B1              (en)* | 1998-03-18 | 2001-01-30 | Secure Computing Corporation | System and method for controlling interactions between networks | 
| US6453419B1              (en) | 1998-03-18 | 2002-09-17 | Secure Computing Corporation | System and method for implementing a security policy | 
| US6052531A              (en) | 1998-03-25 | 2000-04-18 | Symantec Corporation | Multi-tiered incremental software updating | 
| US6154769A              (en) | 1998-03-27 | 2000-11-28 | Hewlett-Packard Company | Scheduling server requests to decrease response time and increase server throughput | 
| US6430184B1              (en) | 1998-04-10 | 2002-08-06 | Top Layer Networks, Inc. | System and process for GHIH-speed pattern matching for application-level switching of data packets | 
| US6092114A              (en) | 1998-04-17 | 2000-07-18 | Siemens Information And Communication Networks, Inc. | Method and system for determining the location for performing file-format conversions of electronics message attachments | 
| US6145083A              (en) | 1998-04-23 | 2000-11-07 | Siemens Information And Communication Networks, Inc. | Methods and system for providing data and telephony security | 
| US6104500A              (en) | 1998-04-29 | 2000-08-15 | Bcl, Computer Inc. | Networked fax routing via email | 
| US6298445B1              (en) | 1998-04-30 | 2001-10-02 | Netect, Ltd. | Computer security | 
| US6119157A              (en) | 1998-05-14 | 2000-09-12 | Sun Microsystems, Inc. | Protocol for exchanging configuration data in a computer network | 
| JP3017712B2              (en) | 1998-05-15 | 2000-03-13 | 松下電送システム株式会社 | Internet facsimile | 
| US6275942B1              (en) | 1998-05-20 | 2001-08-14 | Network Associates, Inc. | System, method and computer program product for automatic response to computer system misuse using active response modules | 
| US6058482A              (en) | 1998-05-22 | 2000-05-02 | Sun Microsystems, Inc. | Apparatus, method and system for providing network security for executable code in computer and communications networks | 
| US6330589B1              (en) | 1998-05-26 | 2001-12-11 | Microsoft Corporation | System and method for using a client database to manage conversation threads generated from email or news messages | 
| GB2337903B              (en) | 1998-05-28 | 2000-06-07 | 3Com Corp | Methods and apparatus for collecting storing processing and using network traffic data | 
| CA2239060A1              (en) | 1998-05-28 | 1999-11-28 | Newbridge Networks Corporation | Rate monitoring of connections in a communications network using history buffer | 
| US6397259B1              (en) | 1998-05-29 | 2002-05-28 | Palm, Inc. | Method, system and apparatus for packet minimized communications | 
| US6289214B1              (en) | 1998-05-29 | 2001-09-11 | Ericsson Inc. | Systems and methods for deactivating a cellular radiotelephone system using an ANSI-41 short message service email | 
| US6167407A              (en) | 1998-06-03 | 2000-12-26 | Symantec Corporation | Backtracked incremental updating | 
| US6347374B1              (en) | 1998-06-05 | 2002-02-12 | Intrusion.Com, Inc. | Event detection | 
| US6240401B1              (en) | 1998-06-05 | 2001-05-29 | Digital Video Express, L.P. | System and method for movie transaction processing | 
| US6216175B1              (en) | 1998-06-08 | 2001-04-10 | Microsoft Corporation | Method for upgrading copies of an original file with same update data after normalizing differences between copies created during respective original installations | 
| AU4568299A              (en)* | 1998-06-15 | 2000-01-05 | Dmw Worldwide, Inc. | Method and apparatus for assessing the security of a computer system | 
| US6317829B1              (en) | 1998-06-19 | 2001-11-13 | Entrust Technologies Limited | Public key cryptography based security system to facilitate secure roaming of users | 
| US6161130A              (en) | 1998-06-23 | 2000-12-12 | Microsoft Corporation | Technique which utilizes a probabilistic classifier to detect "junk" e-mail by automatically updating a training and re-training the classifier based on the updated training set | 
| US6192360B1              (en)* | 1998-06-23 | 2001-02-20 | Microsoft Corporation | Methods and apparatus for classifying text and for building a text classifier | 
| US6266337B1              (en) | 1998-06-23 | 2001-07-24 | Expand Network Ltd. | Packet retransmission eliminator | 
| US6185689B1              (en)* | 1998-06-24 | 2001-02-06 | Richard S. Carson & Assoc., Inc. | Method for network self security assessment | 
| US6049789A              (en) | 1998-06-24 | 2000-04-11 | Mentor Graphics Corporation | Software pay per use licensing system | 
| US6446109B2              (en) | 1998-06-29 | 2002-09-03 | Sun Microsystems, Inc. | Application computing environment | 
| US6141778A              (en) | 1998-06-29 | 2000-10-31 | Mci Communications Corporation | Method and apparatus for automating security functions in a computer system | 
| US6324656B1              (en) | 1998-06-30 | 2001-11-27 | Cisco Technology, Inc. | System and method for rules-driven multi-phase network vulnerability assessment | 
| JP2000023116A              (en) | 1998-07-01 | 2000-01-21 | Hitachi Ltd | Object identifier processing method and recording medium for implementing the method | 
| US6442686B1              (en) | 1998-07-02 | 2002-08-27 | Networks Associates Technology, Inc. | System and methodology for messaging server-based management and enforcement of crypto policies | 
| US6347375B1              (en) | 1998-07-08 | 2002-02-12 | Ontrack Data International, Inc | Apparatus and method for remote virus diagnosis and repair | 
| US6182142B1              (en)* | 1998-07-10 | 2001-01-30 | Encommerce, Inc. | Distributed access management of information resources | 
| US6292833B1              (en) | 1998-07-17 | 2001-09-18 | Openwave Systems Inc. | Method and apparatus for providing access control to local services of mobile devices | 
| US6253337B1              (en) | 1998-07-21 | 2001-06-26 | Raytheon Company | Information security analysis system | 
| US6269447B1              (en) | 1998-07-21 | 2001-07-31 | Raytheon Company | Information security analysis system | 
| US6151675A              (en) | 1998-07-23 | 2000-11-21 | Tumbleweed Software Corporation | Method and apparatus for effecting secure document format conversion | 
| GB2340344A              (en) | 1998-07-29 | 2000-02-16 | Nokia Mobile Phones Ltd | Bilateral Data Transfer Verification for Programming a Cellular Phone | 
| US6223213B1              (en) | 1998-07-31 | 2001-04-24 | Webtv Networks, Inc. | Browser-based email system with user interface for audio/video capture | 
| US6711127B1              (en) | 1998-07-31 | 2004-03-23 | General Dynamics Government Systems Corporation | System for intrusion detection and vulnerability analysis in a telecommunications signaling network | 
| US6266668B1              (en) | 1998-08-04 | 2001-07-24 | Dryken Technologies, Inc. | System and method for dynamic data-mining and on-line communication of customized information | 
| US6330551B1              (en) | 1998-08-06 | 2001-12-11 | Cybersettle.Com, Inc. | Computerized dispute resolution system and method | 
| US6304973B1              (en) | 1998-08-06 | 2001-10-16 | Cryptek Secure Communications, Llc | Multi-level security network system | 
| US6169969B1              (en)* | 1998-08-07 | 2001-01-02 | The United States Of America As Represented By The Director Of The National Security Agency | Device and method for full-text large-dictionary string matching using n-gram hashing | 
| US6356935B1              (en)* | 1998-08-14 | 2002-03-12 | Xircom Wireless, Inc. | Apparatus and method for an authenticated electronic userid | 
| US6442588B1              (en) | 1998-08-20 | 2002-08-27 | At&T Corp. | Method of administering a dynamic filtering firewall | 
| US6223094B1              (en) | 1998-08-21 | 2001-04-24 | Sap Aktiengesellschaft | Multi-tiered structure for storing and displaying product and process variants | 
| US6269380B1              (en) | 1998-08-31 | 2001-07-31 | Xerox Corporation | Property based mechanism for flexibility supporting front-end and back-end components having different communication protocols | 
| US6438612B1              (en) | 1998-09-11 | 2002-08-20 | Ssh Communications Security, Ltd. | Method and arrangement for secure tunneling of data between virtual routers | 
| US6401210B1              (en) | 1998-09-23 | 2002-06-04 | Intel Corporation | Method of managing computer virus infected files | 
| US6324569B1              (en) | 1998-09-23 | 2001-11-27 | John W. L. Ogilvie | Self-removing email verified or designated as such by a message distributor for the convenience of a recipient | 
| US6687732B1              (en) | 1998-09-28 | 2004-02-03 | Inktomi Corporation | Adaptive traffic bypassing in an intercepting network driver | 
| US6338141B1              (en)* | 1998-09-30 | 2002-01-08 | Cybersoft, Inc. | Method and apparatus for computer virus detection, analysis, and removal in real time | 
| US6577920B1              (en) | 1998-10-02 | 2003-06-10 | Data Fellows Oyj | Computer virus screening | 
| US6256733B1              (en) | 1998-10-08 | 2001-07-03 | Entrust Technologies Limited | Access and storage of secure group communication cryptographic keys | 
| US6230190B1              (en) | 1998-10-09 | 2001-05-08 | Openwave Systems Inc. | Shared-everything file storage for clustered system | 
| US6219706B1              (en) | 1998-10-16 | 2001-04-17 | Cisco Technology, Inc. | Access control for networks | 
| US6330670B1              (en) | 1998-10-26 | 2001-12-11 | Microsoft Corporation | Digital rights management operating system | 
| US6327652B1              (en) | 1998-10-26 | 2001-12-04 | Microsoft Corporation | Loading and identifying a digital rights management operating system | 
| US6460141B1              (en) | 1998-10-28 | 2002-10-01 | Rsa Security Inc. | Security and access management system for web-enabled and non-web-enabled applications and content on a computer network | 
| US6260043B1              (en) | 1998-11-06 | 2001-07-10 | Microsoft Corporation | Automatic file format converter | 
| US6321338B1              (en) | 1998-11-09 | 2001-11-20 | Sri International | Network surveillance | 
| US6820202B1              (en) | 1998-11-09 | 2004-11-16 | First Data Corporation | Account authority digital signature (AADS) system | 
| US6282565B1              (en) | 1998-11-17 | 2001-08-28 | Kana Communications, Inc. | Method and apparatus for performing enterprise email management | 
| US6249807B1              (en) | 1998-11-17 | 2001-06-19 | Kana Communications, Inc. | Method and apparatus for performing enterprise email management | 
| US6272532B1              (en) | 1998-12-02 | 2001-08-07 | Harold F. Feinleib | Electronic reminder system with universal email input | 
| US6438549B1              (en) | 1998-12-03 | 2002-08-20 | International Business Machines Corporation | Method for storing sparse hierarchical data in a relational database | 
| US6341369B1              (en)* | 1998-12-03 | 2002-01-22 | International Business Machines Corporation | Method and data processing system for specifying and applying rules to classification-based decision points in an application system | 
| JP4218099B2              (en)* | 1998-12-03 | 2009-02-04 | ソニー株式会社 | Database, customer information search method, and customer information search device | 
| US6571245B2              (en) | 1998-12-07 | 2003-05-27 | Magically, Inc. | Virtual desktop in a computer network | 
| US6266774B1              (en) | 1998-12-08 | 2001-07-24 | Mcafee.Com Corporation | Method and system for securing, managing or optimizing a personal computer | 
| US6370648B1              (en) | 1998-12-08 | 2002-04-09 | Visa International Service Association | Computer network intrusion detection | 
| US6546416B1              (en) | 1998-12-09 | 2003-04-08 | Infoseek Corporation | Method and system for selectively blocking delivery of bulk electronic mail | 
| US6400804B1              (en) | 1998-12-10 | 2002-06-04 | At&T Corp. | On-hold activity selection apparatus and method | 
| US6550012B1              (en) | 1998-12-11 | 2003-04-15 | Network Associates, Inc. | Active firewall system and methodology | 
| US6249575B1              (en) | 1998-12-11 | 2001-06-19 | Securelogix Corporation | Telephony security system | 
| US6510466B1              (en)* | 1998-12-14 | 2003-01-21 | International Business Machines Corporation | Methods, systems and computer program products for centralized management of application programs on a network | 
| US6367009B1              (en) | 1998-12-17 | 2002-04-02 | International Business Machines Corporation | Extending SSL to a multi-tier environment using delegation of authentication and authority | 
| US6430688B1              (en) | 1998-12-22 | 2002-08-06 | International Business Machines Corporation | Architecture for web-based on-line-off-line digital certificate authority | 
| US6664666B2              (en) | 1998-12-23 | 2003-12-16 | Engineering Matters, Inc. | Motor assembly allowing output in multiple degrees of freedom | 
| US6434536B1              (en) | 1998-12-23 | 2002-08-13 | Timothy S. Geiger | Methods and systems for commerce | 
| US6574737B1              (en) | 1998-12-23 | 2003-06-03 | Symantec Corporation | System for penetrating computer or computer network | 
| US6615242B1              (en)* | 1998-12-28 | 2003-09-02 | At&T Corp. | Automatic uniform resource locator-based message filter | 
| US6118856A              (en) | 1998-12-28 | 2000-09-12 | Nortel Networks Corporation | Method and apparatus for automatically forwarding an email message or portion thereof to a remote device | 
| US6301668B1              (en) | 1998-12-29 | 2001-10-09 | Cisco Technology, Inc. | Method and system for adaptive network security using network vulnerability assessment | 
| US6499107B1              (en) | 1998-12-29 | 2002-12-24 | Cisco Technology, Inc. | Method and system for adaptive network security using intelligent packet analysis | 
| US6654787B1              (en) | 1998-12-31 | 2003-11-25 | Brightmail, Incorporated | Method and apparatus for filtering e-mail | 
| US6266692B1              (en) | 1999-01-04 | 2001-07-24 | International Business Machines Corporation | Method for blocking all unwanted e-mail (SPAM) using a header-based password | 
| US6477651B1              (en) | 1999-01-08 | 2002-11-05 | Cisco Technology, Inc. | Intrusion detection system and method having dynamically loaded signatures | 
| US6715082B1              (en) | 1999-01-14 | 2004-03-30 | Cisco Technology, Inc. | Security server token caching | 
| US6487666B1              (en) | 1999-01-15 | 2002-11-26 | Cisco Technology, Inc. | Intrusion detection signature analysis using regular expressions and logical operators | 
| US6578147B1              (en) | 1999-01-15 | 2003-06-10 | Cisco Technology, Inc. | Parallel intrusion detection sensors with load balancing for high speed networks | 
| US6954775B1              (en) | 1999-01-15 | 2005-10-11 | Cisco Technology, Inc. | Parallel intrusion detection sensors with load balancing for high speed networks | 
| US6327594B1              (en) | 1999-01-29 | 2001-12-04 | International Business Machines Corporation | Methods for shared data management in a pervasive computing environment | 
| US7917744B2              (en) | 1999-02-03 | 2011-03-29 | Cybersoft, Inc. | Apparatus and methods for intercepting, examining and controlling code, data and files and their transfer in instant messaging and peer-to-peer applications | 
| US6230266B1              (en) | 1999-02-03 | 2001-05-08 | Sun Microsystems, Inc. | Authentication system and process | 
| US6424650B1              (en) | 1999-02-09 | 2002-07-23 | 3Com Corporation | Network address filter device | 
| US20030023695A1              (en)* | 1999-02-26 | 2003-01-30 | Atabok Japan, Inc. | Modifying an electronic mail system to produce a secure delivery system | 
| JP4779183B2              (en) | 1999-03-26 | 2011-09-28 | ソニー株式会社 | Playback apparatus and playback method | 
| US6405318B1              (en) | 1999-03-12 | 2002-06-11 | Psionic Software, Inc. | Intrusion detection system | 
| US6725377B1              (en) | 1999-03-12 | 2004-04-20 | Networks Associates Technology, Inc. | Method and system for updating anti-intrusion software | 
| US6301699B1              (en) | 1999-03-18 | 2001-10-09 | Corekt Security Systems, Inc. | Method for detecting buffer overflow for computer security | 
| US6438576B1              (en) | 1999-03-29 | 2002-08-20 | International Business Machines Corporation | Method and apparatus of a collaborative proxy system for distributed deployment of object rendering | 
| US6711679B1              (en) | 1999-03-31 | 2004-03-23 | International Business Machines Corporation | Public key infrastructure delegation | 
| US6732149B1              (en) | 1999-04-09 | 2004-05-04 | International Business Machines Corporation | System and method for hindering undesired transmission or receipt of electronic messages | 
| JP2000293587A              (en)* | 1999-04-09 | 2000-10-20 | Sony Corp | Information processor, information processing method, management device and method, and providing medium | 
| US6584488B1              (en) | 1999-04-12 | 2003-06-24 | International Business Machines Corporation | Controlling allocation of system resources with an enhanced priority calculation | 
| US6804778B1              (en) | 1999-04-15 | 2004-10-12 | Gilian Technologies, Ltd. | Data quality assurance | 
| US6681331B1              (en)* | 1999-05-11 | 2004-01-20 | Cylant, Inc. | Dynamic software system intrusion detection | 
| US6981146B1              (en) | 1999-05-17 | 2005-12-27 | Invicta Networks, Inc. | Method of communications and communication network intrusion protection methods and intrusion attempt detection system | 
| US6988199B2              (en)* | 2000-07-07 | 2006-01-17 | Message Secure | Secure and reliable document delivery | 
| US6578025B1              (en) | 1999-06-11 | 2003-06-10 | Abuzz Technologies, Inc. | Method and apparatus for distributing information to users | 
| US6901402B1              (en)* | 1999-06-18 | 2005-05-31 | Microsoft Corporation | System for improving the performance of information retrieval-type tasks by identifying the relations of constituents | 
| US6731756B1              (en) | 1999-06-21 | 2004-05-04 | Elisar Software Corporation, Inc. | Method for securing video images | 
| US6804237B1              (en) | 1999-06-23 | 2004-10-12 | Nortel Networks Limited | Method, devices and signals for multiplexing payload data for transport in a data network | 
| US6484176B1              (en) | 1999-06-25 | 2002-11-19 | Baynet World, Inc. | System and process for providing remote interactive access to a real estate information database using a portable computing device | 
| US6510431B1              (en)* | 1999-06-28 | 2003-01-21 | International Business Machines Corporation | Method and system for the routing of requests using an automated classification and profile matching in a networked environment | 
| US6895436B1              (en) | 1999-07-01 | 2005-05-17 | International Business Machines Corporation | Method and system for evaluating network security | 
| US6675153B1              (en)* | 1999-07-06 | 2004-01-06 | Zix Corporation | Transaction authorization system | 
| US6910135B1              (en) | 1999-07-07 | 2005-06-21 | Verizon Corporate Services Group Inc. | Method and apparatus for an intruder detection reporting and response system | 
| US6560632B1              (en) | 1999-07-16 | 2003-05-06 | International Business Machines Corporation | System and method for managing files in a distributed system using prioritization | 
| US6772346B1              (en) | 1999-07-16 | 2004-08-03 | International Business Machines Corporation | System and method for managing files in a distributed system using filtering | 
| US6675209B1              (en)* | 1999-07-19 | 2004-01-06 | Hewlett-Packard Development Company, L.P. | Method and system for assigning priority among network segments | 
| US6915426B1              (en) | 1999-07-23 | 2005-07-05 | Networks Associates Technology, Inc. | System and method for enabling authentication at different authentication strength-performance levels | 
| US6842860B1              (en)* | 1999-07-23 | 2005-01-11 | Networks Associates Technology, Inc. | System and method for selectively authenticating data | 
| US6845449B1              (en)* | 1999-07-23 | 2005-01-18 | Networks Associates Technology, Inc. | System and method for fast nested message authentication codes and error correction codes | 
| US6976168B1              (en) | 1999-07-23 | 2005-12-13 | Mcafee, Inc. | System and method for adaptive cryptographically synchronized authentication | 
| US7886008B2              (en) | 1999-07-28 | 2011-02-08 | Rpost International Limited | System and method for verifying delivery and integrity of electronic messages | 
| US6684335B1              (en)* | 1999-08-19 | 2004-01-27 | Epstein, Iii Edwin A. | Resistance cell architecture | 
| US6647400B1              (en) | 1999-08-30 | 2003-11-11 | Symantec Corporation | System and method for analyzing filesystems to detect intrusions | 
| US6742015B1              (en) | 1999-08-31 | 2004-05-25 | Accenture Llp | Base services patterns in a netcentric environment | 
| US6324647B1              (en) | 1999-08-31 | 2001-11-27 | Michel K. Bowman-Amuah | System, method and article of manufacture for security management in a development architecture framework | 
| US6332163B1              (en) | 1999-09-01 | 2001-12-18 | Accenture, Llp | Method for providing communication services over a computer network system | 
| US7853989B2              (en) | 2000-02-08 | 2010-12-14 | Katsikas Peter L | System for eliminating unauthorized electronic mail | 
| US6952776B1              (en) | 1999-09-22 | 2005-10-04 | International Business Machines Corporation | Method and apparatus for increasing virus detection speed using a database | 
| US6389419B1              (en) | 1999-10-06 | 2002-05-14 | Cisco Technology, Inc. | Storing and retrieving connection information using bidirectional hashing of connection identifiers | 
| US6304898B1              (en) | 1999-10-13 | 2001-10-16 | Datahouse, Inc. | Method and system for creating and sending graphical email | 
| US6789202B1              (en) | 1999-10-15 | 2004-09-07 | Networks Associates Technology, Inc. | Method and apparatus for providing a policy-driven intrusion detection system | 
| JP3843667B2              (en) | 1999-10-15 | 2006-11-08 | セイコーエプソン株式会社 | Data transfer control device and electronic device | 
| US6662230B1              (en) | 1999-10-20 | 2003-12-09 | International Business Machines Corporation | System and method for dynamically limiting robot access to server data | 
| US7181768B1              (en)* | 1999-10-28 | 2007-02-20 | Cigital | Computer intrusion detection system and method based on application monitoring | 
| US6611869B1              (en) | 1999-10-28 | 2003-08-26 | Networks Associates, Inc. | System and method for providing trustworthy network security concern communication in an active security management environment | 
| JP3463803B2              (en) | 1999-11-09 | 2003-11-05 | 松下電器産業株式会社 | Cluster server device | 
| US6990591B1              (en) | 1999-11-18 | 2006-01-24 | Secureworks, Inc. | Method and system for remotely configuring and monitoring a communication device | 
| US7363361B2              (en) | 2000-08-18 | 2008-04-22 | Akamai Technologies, Inc. | Secure content delivery system | 
| US6321267B1              (en) | 1999-11-23 | 2001-11-20 | Escom Corporation | Method and apparatus for filtering junk email | 
| US6363489B1              (en) | 1999-11-29 | 2002-03-26 | Forescout Technologies Inc. | Method for automatic intrusion detection and deflection in a network | 
| US6851057B1              (en) | 1999-11-30 | 2005-02-01 | Symantec Corporation | Data driven detection of viruses | 
| US6728886B1              (en) | 1999-12-01 | 2004-04-27 | Trend Micro Incorporated | Distributed virus scanning arrangements and methods therefor | 
| US6510464B1              (en)* | 1999-12-14 | 2003-01-21 | Verizon Corporate Services Group Inc. | Secure gateway having routing feature | 
| FR2802667B1              (en) | 1999-12-21 | 2002-01-25 | Bull Sa | METHOD AND DEVICE FOR CONFIGURING FIREWALLS IN A COMPUTER SYSTEM | 
| US6697950B1              (en) | 1999-12-22 | 2004-02-24 | Networks Associates Technology, Inc. | Method and apparatus for detecting a macro computer virus using static analysis | 
| US6460050B1              (en)* | 1999-12-22 | 2002-10-01 | Mark Raymond Pace | Distributed content identification system | 
| US6775657B1              (en) | 1999-12-22 | 2004-08-10 | Cisco Technology, Inc. | Multilayered intrusion detection system and method | 
| US20010034839A1              (en) | 1999-12-24 | 2001-10-25 | Guenter Karjoth | Method and apparatus for secure transmission of data and applications | 
| GB2353372B              (en) | 1999-12-24 | 2001-08-22 | F Secure Oyj | Remote computer virus scanning | 
| US6701440B1              (en) | 2000-01-06 | 2004-03-02 | Networks Associates Technology, Inc. | Method and system for protecting a computer using a remote e-mail scanning device | 
| US6976271B1              (en) | 2000-01-06 | 2005-12-13 | International Business Machines Corporation | Method and system for retrieving an anti-virus signature from one or a plurality of virus-free certificate authorities | 
| US6928550B1              (en) | 2000-01-06 | 2005-08-09 | International Business Machines Corporation | Method and system for generating and using a virus free file certificate | 
| US6735700B1              (en) | 2000-01-11 | 2004-05-11 | Network Associates Technology, Inc. | Fast virus scanning using session stamping | 
| US6785818B1              (en) | 2000-01-14 | 2004-08-31 | Symantec Corporation | Thwarting malicious registry mapping modifications and map-loaded module masquerade attacks | 
| US6802002B1              (en) | 2000-01-14 | 2004-10-05 | Hewlett-Packard Development Company, L.P. | Method and apparatus for providing field confidentiality in digital certificates | 
| IL134066A              (en) | 2000-01-16 | 2004-07-25 | Eluv Holdings Ltd | Key encrypted e-mail system | 
| JP2001209584A              (en) | 2000-01-26 | 2001-08-03 | Nec Niigata Ltd | Data encryption device and its method | 
| US6883101B1              (en) | 2000-02-08 | 2005-04-19 | Harris Corporation | System and method for assessing the security posture of a network using goal oriented fuzzy logic decision rules | 
| US20020016910A1              (en)* | 2000-02-11 | 2002-02-07 | Wright Robert P. | Method for secure distribution of documents over electronic networks | 
| US7117246B2              (en) | 2000-02-22 | 2006-10-03 | Sendmail, Inc. | Electronic mail system with methodology providing distributed message store | 
| US6452613B1              (en) | 2000-03-01 | 2002-09-17 | First Usa Bank, N.A. | System and method for an automated scoring tool for assessing new technologies | 
| US6691156B1              (en) | 2000-03-10 | 2004-02-10 | International Business Machines Corporation | Method for restricting delivery of unsolicited E-mail | 
| US6971019B1              (en) | 2000-03-14 | 2005-11-29 | Symantec Corporation | Histogram-based virus detection | 
| US7159237B2              (en)* | 2000-03-16 | 2007-01-02 | Counterpane Internet Security, Inc. | Method and system for dynamic network intrusion monitoring, detection and response | 
| US6842861B1              (en)* | 2000-03-24 | 2005-01-11 | Networks Associates Technology, Inc. | Method and system for detecting viruses on handheld computers | 
| US6748531B1              (en) | 2000-03-28 | 2004-06-08 | Koninklijke Philips Electronics N.V | Method and apparatus for confirming and revoking trust in a multi-level content distribution system | 
| US6892237B1              (en) | 2000-03-28 | 2005-05-10 | Cisco Technology, Inc. | Method and apparatus for high-speed parsing of network messages | 
| US7177421B2              (en)* | 2000-04-13 | 2007-02-13 | Broadcom Corporation | Authentication engine architecture and method | 
| US6519703B1              (en) | 2000-04-14 | 2003-02-11 | James B. Joyce | Methods and apparatus for heuristic firewall | 
| US6584564B2              (en)* | 2000-04-25 | 2003-06-24 | Sigaba Corporation | Secure e-mail system | 
| US7089428B2              (en) | 2000-04-28 | 2006-08-08 | Internet Security Systems, Inc. | Method and system for managing computer security information | 
| WO2001084775A2              (en)* | 2000-04-28 | 2001-11-08 | Internet Security Systems, Inc. | System and method for managing security events on a network | 
| US6735703B1              (en) | 2000-05-08 | 2004-05-11 | Networks Associates Technology, Inc. | Multi-platform sequence-based anomaly detection wrapper | 
| US6742124B1              (en) | 2000-05-08 | 2004-05-25 | Networks Associates Technology, Inc. | Sequence-based anomaly detection using a distance matrix | 
| US6968336B1              (en) | 2000-05-18 | 2005-11-22 | International Business Machines Corporation | Method for generating, organizing table codes either code is highest code level or code is linked to parent code in hierarchical structure | 
| US6950933B1              (en) | 2000-05-19 | 2005-09-27 | Networks Associates Technology, Inc. | Method and system for management and notification of electronic certificate changes | 
| US6922776B2              (en) | 2000-05-19 | 2005-07-26 | Networks Associates Technology, Inc. | Scalable system and method for management and notification of electronic certificate changes | 
| US20030159070A1              (en) | 2001-05-28 | 2003-08-21 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | 
| JP2002056176A              (en) | 2000-06-01 | 2002-02-20 | Asgent Inc | Security policy construction method and apparatus, and method and apparatus for supporting security policy construction | 
| US6895385B1              (en) | 2000-06-02 | 2005-05-17 | Open Ratings | Method and system for ascribing a reputation to an entity as a rater of other entities | 
| US6892179B1              (en) | 2000-06-02 | 2005-05-10 | Open Ratings Inc. | System and method for ascribing a reputation to an entity | 
| US6892178B1              (en) | 2000-06-02 | 2005-05-10 | Open Ratings Inc. | Method and system for ascribing a reputation to an entity from the perspective of another entity | 
| US20020023140A1              (en)* | 2000-06-08 | 2002-02-21 | Hile John K. | Electronic document delivery system | 
| US7007301B2              (en) | 2000-06-12 | 2006-02-28 | Hewlett-Packard Development Company, L.P. | Computer architecture for an intrusion detection system | 
| US7134141B2              (en) | 2000-06-12 | 2006-11-07 | Hewlett-Packard Development Company, L.P. | System and method for host and network based intrusion detection and response | 
| US6611925B1              (en) | 2000-06-13 | 2003-08-26 | Networks Associates Technology, Inc. | Single point of entry/origination item scanning within an enterprise or workgroup | 
| US6985923B1              (en)* | 2000-06-13 | 2006-01-10 | International Business Machines Corporation | Method, article of manufacture and apparatus for processing redundant electronic mail messages | 
| US6732101B1              (en) | 2000-06-15 | 2004-05-04 | Zix Corporation | Secure message forwarding system detecting user's preferences including security preferences | 
| US6721721B1              (en) | 2000-06-15 | 2004-04-13 | International Business Machines Corporation | Virus checking and reporting for computer database search results | 
| US20030061506A1              (en) | 2001-04-05 | 2003-03-27 | Geoffrey Cooper | System and method for security policy | 
| US7328349B2              (en) | 2001-12-14 | 2008-02-05 | Bbn Technologies Corp. | Hash-based systems and methods for detecting, preventing, and tracing network worms and viruses | 
| US7058974B1              (en) | 2000-06-21 | 2006-06-06 | Netrake Corporation | Method and apparatus for preventing denial of service attacks | 
| US20020046041A1              (en) | 2000-06-23 | 2002-04-18 | Ken Lang | Automated reputation/trust service | 
| US7127743B1              (en) | 2000-06-23 | 2006-10-24 | Netforensics, Inc. | Comprehensive security structure platform for network managers | 
| WO2002003653A2              (en) | 2000-06-30 | 2002-01-10 | British Telecommunications Public Limited Company | Packet data communications | 
| US6870849B1              (en) | 2000-07-06 | 2005-03-22 | Ross W. Callon | Apparatus and method for efficient hashing in networks | 
| US8661539B2              (en) | 2000-07-10 | 2014-02-25 | Oracle International Corporation | Intrusion threat detection | 
| US6738462B1              (en) | 2000-07-19 | 2004-05-18 | Avaya Technology Corp. | Unified communications automated personal name addressing | 
| US6757675B2              (en) | 2000-07-24 | 2004-06-29 | The Regents Of The University Of California | Method and apparatus for indexing document content and content comparison with World Wide Web search service | 
| IL153955A0              (en) | 2000-07-25 | 2003-07-31 | Peribit Networks Inc | Network architecture and methods for transparent on-line cross-sessional encoding and transport of network communications data | 
| US6687696B2              (en) | 2000-07-26 | 2004-02-03 | Recommind Inc. | System and method for personalized search, information filtering, and for generating recommendations utilizing statistical latent class models | 
| US6687687B1              (en) | 2000-07-26 | 2004-02-03 | Zix Scm, Inc. | Dynamic indexing information retrieval or filtering system | 
| US7085934B1              (en) | 2000-07-27 | 2006-08-01 | Mcafee, Inc. | Method and system for limiting processor utilization by a virus scanner | 
| GB2365158A              (en) | 2000-07-28 | 2002-02-13 | Content Technologies Ltd | File analysis using byte distributions | 
| EP1312193A2              (en) | 2000-08-16 | 2003-05-21 | Filestream, Inc. | End-to-end secure file transfer method and system | 
| US6799197B1              (en) | 2000-08-29 | 2004-09-28 | Networks Associates Technology, Inc. | Secure method and system for using a public network or email to administer to software on a plurality of client computers | 
| US6910134B1              (en) | 2000-08-29 | 2005-06-21 | Netrake Corporation | Method and device for innoculating email infected with a virus | 
| US6772334B1              (en) | 2000-08-31 | 2004-08-03 | Networks Associates, Inc. | System and method for preventing a spoofed denial of service attack in a networked computing environment | 
| GB2368233B              (en) | 2000-08-31 | 2002-10-16 | F Secure Oyj | Maintaining virus detection software | 
| US7043759B2              (en) | 2000-09-07 | 2006-05-09 | Mazu Networks, Inc. | Architecture to thwart denial of service attacks | 
| US7278159B2              (en) | 2000-09-07 | 2007-10-02 | Mazu Networks, Inc. | Coordinated thwarting of denial of service attacks | 
| US20020032793A1              (en) | 2000-09-08 | 2002-03-14 | The Regents Of The University Of Michigan | Method and system for reconstructing a path taken by undesirable network traffic through a computer network from a source of the traffic | 
| US20020032871A1              (en) | 2000-09-08 | 2002-03-14 | The Regents Of The University Of Michigan | Method and system for detecting, tracking and blocking denial of service attacks over a computer network | 
| US20020038339A1              (en) | 2000-09-08 | 2002-03-28 | Wei Xu | Systems and methods for packet distribution | 
| US6785732B1              (en) | 2000-09-11 | 2004-08-31 | International Business Machines Corporation | Web server apparatus and method for virus checking | 
| US6826698B1              (en) | 2000-09-15 | 2004-11-30 | Networks Associates Technology, Inc. | System, method and computer program product for rule based network security policies | 
| US6650890B1              (en) | 2000-09-29 | 2003-11-18 | Postini, Inc. | Value-added electronic messaging services and transparent implementation thereof using intermediate server | 
| US6968461B1              (en) | 2000-10-03 | 2005-11-22 | Networks Associates Technology, Inc. | Providing break points in a malware scanning operation | 
| US6757830B1              (en) | 2000-10-03 | 2004-06-29 | Networks Associates Technology, Inc. | Detecting unwanted properties in received email messages | 
| US20020069263A1              (en) | 2000-10-13 | 2002-06-06 | Mark Sears | Wireless java technology | 
| US20030097439A1              (en) | 2000-10-23 | 2003-05-22 | Strayer William Timothy | Systems and methods for identifying anomalies in network data streams | 
| US20020129002A1              (en) | 2000-10-27 | 2002-09-12 | Alberts Douglas Wesley | eMediaCarts | 
| US7082536B2              (en) | 2000-11-13 | 2006-07-25 | Globalcerts, Lc | System and method for computerized global messaging encryption | 
| US20040181462A1              (en)* | 2000-11-17 | 2004-09-16 | Bauer Robert D. | Electronic communication service | 
| US6934857B1              (en) | 2000-11-27 | 2005-08-23 | Networks Associates Technology, Inc. | Security system and method for handheld computers | 
| US6782503B1              (en) | 2000-11-28 | 2004-08-24 | Nortel Networks Limited | Generating a signature to add to a test packet to achieve a target check value | 
| US20020078382A1              (en) | 2000-11-29 | 2002-06-20 | Ali Sheikh | Scalable system for monitoring network system and components and methodology therefore | 
| DE60124295T8              (en) | 2000-11-30 | 2007-12-06 | Lancope, Inc. | RIVER-BASED DETECTION OF AN INSERT INTO A NETWORK | 
| CA2327211A1              (en) | 2000-12-01 | 2002-06-01 | Nortel Networks Limited | Management of log archival and reporting for data network security systems | 
| US7844666B2              (en) | 2000-12-12 | 2010-11-30 | Microsoft Corporation | Controls and displays for acquiring preferences, inspecting behavior, and guiding the learning and decision policies of an adaptive communications prioritization and routing system | 
| US6622150B1              (en) | 2000-12-18 | 2003-09-16 | Networks Associates Technology, Inc. | System and method for efficiently managing computer virus definitions using a structured virus database | 
| US20020083342A1              (en) | 2000-12-21 | 2002-06-27 | Webb Brian T. | Systems, methods and computer program products for accessing devices on private networks via clients on a public network | 
| US6738932B1              (en) | 2000-12-22 | 2004-05-18 | Sun Microsystems, Inc. | Method and system for identifying software revisions from memory images | 
| US6725223B2              (en)* | 2000-12-22 | 2004-04-20 | International Business Machines Corporation | Storage format for encoded vector indexes | 
| US20030084020A1              (en) | 2000-12-22 | 2003-05-01 | Li Shu | Distributed fault tolerant and secure storage | 
| US6775704B1              (en) | 2000-12-28 | 2004-08-10 | Networks Associates Technology, Inc. | System and method for preventing a spoofed remote procedure call denial of service attack in a networked computing environment | 
| US6779033B1              (en) | 2000-12-28 | 2004-08-17 | Networks Associates Technology, Inc. | System and method for transacting a validated application session in a networked computing environment | 
| MXPA03006024A              (en) | 2001-01-02 | 2005-02-14 | Trusecure Corp | Object-oriented method, system and medium for risk management by creating inter-dependency between objects, criteria and metrics. | 
| US6965939B2              (en) | 2001-01-05 | 2005-11-15 | International Business Machines Corporation | Method and apparatus for processing requests in a network data processing system based on a trust association between servers | 
| GB2371125A              (en) | 2001-01-13 | 2002-07-17 | Secr Defence | Computer protection system | 
| US20020133586A1              (en) | 2001-01-16 | 2002-09-19 | Carter Shanklin | Method and device for monitoring data traffic and preventing unauthorized access to a network | 
| US20030051026A1              (en) | 2001-01-19 | 2003-03-13 | Carter Ernst B. | Network surveillance and security system | 
| US7168093B2              (en) | 2001-01-25 | 2007-01-23 | Solutionary, Inc. | Method and apparatus for verifying the integrity and security of computer networks and implementation of counter measures | 
| US6983380B2              (en) | 2001-02-06 | 2006-01-03 | Networks Associates Technology, Inc. | Automatically generating valid behavior specifications for intrusion detection | 
| US7281267B2              (en) | 2001-02-20 | 2007-10-09 | Mcafee, Inc. | Software audit system | 
| US8219620B2              (en) | 2001-02-20 | 2012-07-10 | Mcafee, Inc. | Unwanted e-mail filtering system including voting feedback | 
| US7415504B2              (en)* | 2001-02-26 | 2008-08-19 | Symantec Corporation | System and method for controlling distribution of network communications | 
| US20020120853A1              (en) | 2001-02-27 | 2002-08-29 | Networks Associates Technology, Inc. | Scripted distributed denial-of-service (DDoS) attack discrimination using turing tests | 
| US7363657B2              (en) | 2001-03-12 | 2008-04-22 | Emc Corporation | Using a virus checker in one file server to check for viruses in another file server | 
| US20020143963A1              (en) | 2001-03-15 | 2002-10-03 | International Business Machines Corporation | Web server intrusion detection method and apparatus | 
| US7313822B2              (en)* | 2001-03-16 | 2007-12-25 | Protegrity Corporation | Application-layer security method and system | 
| US20020133365A1              (en) | 2001-03-19 | 2002-09-19 | William Grey | System and method for aggregating reputational information | 
| US7287280B2              (en) | 2002-02-12 | 2007-10-23 | Goldman Sachs & Co. | Automated security management | 
| US20040193482A1              (en) | 2001-03-23 | 2004-09-30 | Restaurant Services, Inc. | System, method and computer program product for user-specific advertising in a supply chain management framework | 
| US20020138759A1              (en) | 2001-03-26 | 2002-09-26 | International Business Machines Corporation | System and method for secure delivery of a parcel or document | 
| US7010696B1              (en) | 2001-03-30 | 2006-03-07 | Mcafee, Inc. | Method and apparatus for predicting the incidence of a virus | 
| US7080000B1              (en) | 2001-03-30 | 2006-07-18 | Mcafee, Inc. | Method and system for bi-directional updating of antivirus database | 
| US7007169B2              (en) | 2001-04-04 | 2006-02-28 | International Business Machines Corporation | Method and apparatus for protecting a web server against vandals attacks without restricting legitimate access | 
| WO2002093334A2              (en) | 2001-04-06 | 2002-11-21 | Symantec Corporation | Temporal access control for computer virus outbreaks | 
| US20020147734A1              (en) | 2001-04-06 | 2002-10-10 | Shoup Randall Scott | Archiving method and system | 
| US20020147780A1              (en) | 2001-04-09 | 2002-10-10 | Liu James Y. | Method and system for scanning electronic mail to detect and eliminate computer viruses using a group of email-scanning servers and a recipient's email gateway | 
| US7089589B2              (en) | 2001-04-10 | 2006-08-08 | Lenovo (Singapore) Pte. Ltd. | Method and apparatus for the detection, notification, and elimination of certain computer viruses on a network using a promiscuous system as bait | 
| US20020194161A1              (en) | 2001-04-12 | 2002-12-19 | Mcnamee J. Paul | Directed web crawler with machine learning | 
| US6941478B2              (en) | 2001-04-13 | 2005-09-06 | Nokia, Inc. | System and method for providing exploit protection with message tracking | 
| CN1509438A              (en)* | 2001-04-13 | 2004-06-30 | ��˹��ŵ�� | System and method for providing utilization protection for a network | 
| US6947936B1              (en) | 2001-04-30 | 2005-09-20 | Hewlett-Packard Development Company, L.P. | Method for a topic hierarchy classification system | 
| US7603709B2              (en) | 2001-05-03 | 2009-10-13 | Computer Associates Think, Inc. | Method and apparatus for predicting and preventing attacks in communications networks | 
| US7769845B2              (en) | 2001-05-04 | 2010-08-03 | Whale Communications Ltd | Method and system for terminating an authentication session upon user sign-off | 
| US20030055931A1              (en) | 2001-09-18 | 2003-03-20 | Cravo De Almeida Marcio | Managing a remote device | 
| US7228565B2              (en) | 2001-05-15 | 2007-06-05 | Mcafee, Inc. | Event reporting between a reporting computer and a receiving computer | 
| US6768991B2              (en) | 2001-05-15 | 2004-07-27 | Networks Associates Technology, Inc. | Searching for sequences of character data | 
| CA2386491A1              (en) | 2001-05-16 | 2002-11-16 | Kasten Chase Applied Research Limited | System for secure electronic information transmission | 
| US7325252B2              (en)* | 2001-05-18 | 2008-01-29 | Achilles Guard Inc. | Network security testing | 
| US20030028803A1              (en) | 2001-05-18 | 2003-02-06 | Bunker Nelson Waldo | Network vulnerability assessment system and method | 
| US20020178227A1              (en) | 2001-05-25 | 2002-11-28 | International Business Machines Corporation | Routing instant messages using configurable, pluggable delivery managers | 
| US20030009698A1              (en)* | 2001-05-30 | 2003-01-09 | Cascadezone, Inc. | Spam avenger | 
| US7380126B2              (en) | 2001-06-01 | 2008-05-27 | Logan James D | Methods and apparatus for controlling the transmission and receipt of email messages | 
| US7458094B2              (en) | 2001-06-06 | 2008-11-25 | Science Applications International Corporation | Intrusion prevention system | 
| US20040103315A1              (en) | 2001-06-07 | 2004-05-27 | Geoffrey Cooper | Assessment tool | 
| US7350234B2              (en) | 2001-06-11 | 2008-03-25 | Research Triangle Institute | Intrusion tolerant communication networks and associated methods | 
| US20020186698A1              (en) | 2001-06-12 | 2002-12-12 | Glen Ceniza | System to map remote lan hosts to local IP addresses | 
| WO2002101516A2              (en)* | 2001-06-13 | 2002-12-19 | Intruvert Networks, Inc. | Method and apparatus for distributed network security | 
| DE60135449D1              (en) | 2001-06-14 | 2008-10-02 | Ibm | Intrusion detection in data processing systems | 
| US20020194490A1              (en) | 2001-06-18 | 2002-12-19 | Avner Halperin | System and method of virus containment in computer networks | 
| EP1271283B1              (en)* | 2001-06-29 | 2007-05-23 | Stonesoft Corporation | An intrusion detection method and system | 
| US20030005326A1              (en)* | 2001-06-29 | 2003-01-02 | Todd Flemming | Method and system for implementing a security application services provider | 
| US6928549B2              (en)* | 2001-07-09 | 2005-08-09 | International Business Machines Corporation | Dynamic intrusion detection for computer systems | 
| US7356689B2              (en)* | 2001-07-09 | 2008-04-08 | Lucent Technologies Inc. | Method and apparatus for tracing packets in a communications network | 
| US7380279B2              (en)* | 2001-07-16 | 2008-05-27 | Lenel Systems International, Inc. | System for integrating security and access for facilities and information systems | 
| US7023861B2              (en)* | 2001-07-26 | 2006-04-04 | Mcafee, Inc. | Malware scanning using a network bridge | 
| US6769016B2              (en) | 2001-07-26 | 2004-07-27 | Networks Associates Technology, Inc. | Intelligent SPAM detection system using an updateable neural analysis engine | 
| US7673342B2              (en)* | 2001-07-26 | 2010-03-02 | Mcafee, Inc. | Detecting e-mail propagated malware | 
| JP2003046576A              (en)* | 2001-07-27 | 2003-02-14 | Fujitsu Ltd | Message delivery system, message delivery management server, message delivery management program, and computer-readable recording medium recording the program | 
| US7181015B2              (en) | 2001-07-31 | 2007-02-20 | Mcafee, Inc. | Method and apparatus for cryptographic key establishment using an identity based symmetric keying technique | 
| US7117533B1              (en) | 2001-08-03 | 2006-10-03 | Mcafee, Inc. | System and method for providing dynamic screening of transient messages in a distributed computing environment | 
| US6993660B1              (en)* | 2001-08-03 | 2006-01-31 | Mcafee, Inc. | System and method for performing efficient computer virus scanning of transient messages using checksums in a distributed computing environment | 
| US6745192B1              (en) | 2001-08-03 | 2004-06-01 | Networks Associates Technology Inc. | System and method for providing a multi-tiered hierarchical transient message store accessed using multiply hashed unique filenames | 
| US7243374B2              (en) | 2001-08-08 | 2007-07-10 | Microsoft Corporation | Rapid application security threat analysis | 
| US20030033463A1              (en) | 2001-08-10 | 2003-02-13 | Garnett Paul J. | Computer system storage | 
| US20030037141A1              (en) | 2001-08-16 | 2003-02-20 | Gary Milo | Heuristic profiler software features | 
| US7278160B2              (en) | 2001-08-16 | 2007-10-02 | International Business Machines Corporation | Presentation of correlated events as situation classes | 
| US7120252B1              (en) | 2001-08-16 | 2006-10-10 | Mcafee, Inc. | System and method for automatically protecting private video content using cryptographic security for legacy systems | 
| US7657935B2              (en)* | 2001-08-16 | 2010-02-02 | The Trustees Of Columbia University In The City Of New York | System and methods for detecting malicious email transmission | 
| US6928556B2              (en) | 2001-08-30 | 2005-08-09 | International Business Machines Corporation | Method and apparatus in a data processing system for managing situations from correlated events | 
| US6978223B2              (en) | 2001-09-06 | 2005-12-20 | Bbnt Solutions Llc | Systems and methods for network performance measurement using packet signature collection | 
| US20030051163A1              (en) | 2001-09-13 | 2003-03-13 | Olivier Bidaud | Distributed network architecture security system | 
| US7107618B1              (en) | 2001-09-25 | 2006-09-12 | Mcafee, Inc. | System and method for certifying that data received over a computer network has been checked for viruses | 
| US7266844B2              (en) | 2001-09-27 | 2007-09-04 | Mcafee, Inc. | Heuristic detection of polymorphic computer viruses based on redundancy in viral code | 
| US20030065943A1              (en) | 2001-09-28 | 2003-04-03 | Christoph Geis | Method and apparatus for recognizing and reacting to denial of service attacks on a computerized network | 
| US7010608B2              (en) | 2001-09-28 | 2006-03-07 | Intel Corporation | System and method for remotely accessing a home server while preserving end-to-end security | 
| US6892241B2              (en) | 2001-09-28 | 2005-05-10 | Networks Associates Technology, Inc. | Anti-virus policy enforcement system and method | 
| US6907430B2              (en) | 2001-10-04 | 2005-06-14 | Booz-Allen Hamilton, Inc. | Method and system for assessing attacks on computer networks using Bayesian networks | 
| US7310818B1              (en) | 2001-10-25 | 2007-12-18 | Mcafee, Inc. | System and method for tracking computer viruses | 
| US8261059B2              (en) | 2001-10-25 | 2012-09-04 | Verizon Business Global Llc | Secure file transfer and secure file transfer protocol | 
| US20030084323A1              (en) | 2001-10-31 | 2003-05-01 | Gales George S. | Network intrusion detection system and method | 
| US7444679B2              (en) | 2001-10-31 | 2008-10-28 | Hewlett-Packard Development Company, L.P. | Network, method and computer readable medium for distributing security updates to select nodes on a network | 
| US20030135749A1              (en) | 2001-10-31 | 2003-07-17 | Gales George S. | System and method of defining the security vulnerabilities of a computer system | 
| JP2003150748A              (en) | 2001-11-09 | 2003-05-23 | Asgent Inc | Risk assessment method | 
| US7315944B2              (en) | 2001-11-13 | 2008-01-01 | Ericsson Inc. | Secure handling of stored-value data objects | 
| US20030093695A1              (en) | 2001-11-13 | 2003-05-15 | Santanu Dutta | Secure handling of stored-value data objects | 
| US7487262B2              (en) | 2001-11-16 | 2009-02-03 | At & T Mobility Ii, Llc | Methods and systems for routing messages through a communications network based on message content | 
| US20030095555A1              (en) | 2001-11-16 | 2003-05-22 | Mcnamara Justin | System for the validation and routing of messages | 
| US20030101381A1              (en) | 2001-11-29 | 2003-05-29 | Nikolay Mateev | System and method for virus checking software | 
| AU2002357029A1              (en) | 2001-11-30 | 2003-06-17 | A New Voice, Inc. | Method and system for contextual prioritization of unified messages | 
| US6546493B1              (en) | 2001-11-30 | 2003-04-08 | Networks Associates Technology, Inc. | System, method and computer program product for risk assessment scanning based on detected anomalous events | 
| US20030126464A1              (en) | 2001-12-04 | 2003-07-03 | Mcdaniel Patrick D. | Method and system for determining and enforcing security policy in a communication session | 
| US7150042B2              (en) | 2001-12-06 | 2006-12-12 | Mcafee, Inc. | Techniques for performing malware scanning of files stored within a file storage device of a computer network | 
| US7093002B2              (en) | 2001-12-06 | 2006-08-15 | Mcafee, Inc. | Handling of malware scanning of files stored within a file storage device of a computer network | 
| US20030110392A1              (en) | 2001-12-06 | 2003-06-12 | Aucsmith David W. | Detecting intrusions | 
| US7150043B2              (en) | 2001-12-12 | 2006-12-12 | International Business Machines Corporation | Intrusion detection method and signature table | 
| KR100427449B1              (en) | 2001-12-14 | 2004-04-14 | 한국전자통신연구원 | Intrusion detection method using adaptive rule estimation in nids | 
| US7096500B2              (en) | 2001-12-21 | 2006-08-22 | Mcafee, Inc. | Predictive malware scanning of internet data | 
| US6754705B2              (en) | 2001-12-21 | 2004-06-22 | Networks Associates Technology, Inc. | Enterprise network analyzer architecture framework | 
| US7400729B2              (en) | 2001-12-28 | 2008-07-15 | Intel Corporation | Secure delivery of encrypted digital content | 
| CA2472268A1              (en) | 2001-12-31 | 2003-07-17 | Citadel Security Software Inc. | Automated computer vulnerability resolution system | 
| JP4152108B2              (en) | 2002-01-18 | 2008-09-17 | 株式会社コムスクエア | Vulnerability monitoring method and system | 
| US7076803B2              (en) | 2002-01-28 | 2006-07-11 | International Business Machines Corporation | Integrated intrusion detection services | 
| US7222366B2              (en) | 2002-01-28 | 2007-05-22 | International Business Machines Corporation | Intrusion event filtering | 
| US7743415B2              (en) | 2002-01-31 | 2010-06-22 | Riverbed Technology, Inc. | Denial of service attacks characterization | 
| US7268899B2              (en) | 2002-01-31 | 2007-09-11 | Hewlett-Packard Development Company, L.P. | Secure system for delivery of a fax to a remote user | 
| US7174566B2              (en) | 2002-02-01 | 2007-02-06 | Intel Corporation | Integrated network intrusion detection | 
| US20030149887A1              (en) | 2002-02-01 | 2003-08-07 | Satyendra Yadav | Application-specific network intrusion detection | 
| US6760845B1              (en) | 2002-02-08 | 2004-07-06 | Networks Associates Technology, Inc. | Capture file format system and method for a network analyzer | 
| US8370936B2              (en) | 2002-02-08 | 2013-02-05 | Juniper Networks, Inc. | Multi-method gateway-based network security systems and methods | 
| US7073074B2              (en) | 2002-02-13 | 2006-07-04 | Microsoft Corporation | System and method for storing events to enhance intrusion detection | 
| KR100468232B1              (en) | 2002-02-19 | 2005-01-26 | 한국전자통신연구원 | Network-based Attack Tracing System and Method Using Distributed Agent and Manager Systems | 
| WO2003071390A2              (en) | 2002-02-19 | 2003-08-28 | Postini Corporation | E-mail management services | 
| US7458098B2              (en) | 2002-03-08 | 2008-11-25 | Secure Computing Corporation | Systems and methods for enhancing electronic communication security | 
| US6941467B2              (en) | 2002-03-08 | 2005-09-06 | Ciphertrust, Inc. | Systems and methods for adaptive message interrogation through multiple queues | 
| US7096498B2              (en) | 2002-03-08 | 2006-08-22 | Cipher Trust, Inc. | Systems and methods for message threat management | 
| US7694128B2              (en) | 2002-03-08 | 2010-04-06 | Mcafee, Inc. | Systems and methods for secure communication delivery | 
| US7124438B2              (en) | 2002-03-08 | 2006-10-17 | Ciphertrust, Inc. | Systems and methods for anomaly detection in patterns of monitored communications | 
| US20030233328A1              (en) | 2002-04-23 | 2003-12-18 | Scott David A. | Method and system for securely communicating data in a communications network | 
| AUPS193202A0              (en) | 2002-04-23 | 2002-05-30 | Pickup, Robert Barkley Mr | A method and system for authorising electronic mail | 
| US6741595B2              (en) | 2002-06-11 | 2004-05-25 | Netrake Corporation | Device for enabling trap and trace of internet protocol communications | 
| EP1376420A1              (en) | 2002-06-19 | 2004-01-02 | Pitsos Errikos | Method and system for classifying electronic documents | 
| US20040203589A1              (en) | 2002-07-11 | 2004-10-14 | Wang Jiwei R. | Method and system for controlling messages in a communication network | 
| US7222157B1              (en)* | 2002-07-15 | 2007-05-22 | Aol Llc | Identification and filtration of digital communications | 
| US8924484B2              (en)* | 2002-07-16 | 2014-12-30 | Sonicwall, Inc. | Active e-mail filter with challenge-response | 
| US7017186B2              (en) | 2002-07-30 | 2006-03-21 | Steelcloud, Inc. | Intrusion detection system using self-organizing clusters | 
| US6847888B2              (en)* | 2002-08-07 | 2005-01-25 | Hrl Laboratories, Llc | Method and apparatus for geographic shape preservation for identification | 
| US6742128B1              (en) | 2002-08-28 | 2004-05-25 | Networks Associates Technology | Threat assessment orchestrator system and method | 
| JP3831696B2              (en) | 2002-09-20 | 2006-10-11 | 株式会社日立製作所 | Network management apparatus and network management method | 
| US7200658B2              (en)* | 2002-11-12 | 2007-04-03 | Movielink, Llc | Network geo-location system | 
| US20040111531A1              (en) | 2002-12-06 | 2004-06-10 | Stuart Staniford | Method and system for reducing the rate of infection of a communications network by a software worm | 
| US6732157B1              (en) | 2002-12-13 | 2004-05-04 | Networks Associates Technology, Inc. | Comprehensive anti-spam system, method, and computer program product for filtering unwanted e-mail messages | 
| US6859793B1              (en) | 2002-12-19 | 2005-02-22 | Networks Associates Technology, Inc. | Software license reporting and control system and method | 
| US7401141B2              (en)* | 2003-01-07 | 2008-07-15 | International Business Machines Corporation | Method and system for monitoring performance of distributed applications | 
| US7171450B2              (en) | 2003-01-09 | 2007-01-30 | Microsoft Corporation | Framework to enable integration of anti-spam technologies | 
| US8266215B2              (en) | 2003-02-20 | 2012-09-11 | Sonicwall, Inc. | Using distinguishing properties to classify messages | 
| US20040177120A1              (en) | 2003-03-07 | 2004-09-09 | Kirsch Steven T. | Method for filtering e-mail messages | 
| US20060168006A1              (en)* | 2003-03-24 | 2006-07-27 | Mr. Marvin Shannon | System and method for the classification of electronic communication | 
| JP2004284241A              (en) | 2003-03-24 | 2004-10-14 | Tdk Corp | Optical recording medium and sputtering target for optical recording medium | 
| US7676546B2              (en) | 2003-03-25 | 2010-03-09 | Verisign, Inc. | Control and management of electronic messaging | 
| GB0307913D0              (en) | 2003-04-05 | 2003-05-14 | Hewlett Packard Development Co | Management of peer-to-peer network using reputation services | 
| US7483947B2              (en)* | 2003-05-02 | 2009-01-27 | Microsoft Corporation | Message rendering for identification of content features | 
| CN1849121A              (en)* | 2003-06-20 | 2006-10-18 | 安姆根有限公司 | Piperazine derivatives as bradyknin antagonist | 
| US7051077B2              (en) | 2003-06-30 | 2006-05-23 | Mx Logic, Inc. | Fuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers | 
| US7769594B2              (en) | 2003-09-05 | 2010-08-03 | France Telecom | Evaluation of reputation of an entity by a primary evaluation centre | 
| US7415018B2              (en) | 2003-09-17 | 2008-08-19 | Alcatel Lucent | IP Time to Live (TTL) field used as a covert channel | 
| US20050086526A1              (en) | 2003-10-17 | 2005-04-21 | Panda Software S.L. (Sociedad Unipersonal) | Computer implemented method providing software virus infection information in real time | 
| US20050102366A1              (en) | 2003-11-07 | 2005-05-12 | Kirsch Steven T. | E-mail filter employing adaptive ruleset | 
| US7624274B1              (en)* | 2004-02-11 | 2009-11-24 | AOL LLC, a Delaware Limited Company | Decreasing the fragility of duplicate document detecting algorithms | 
| US7644127B2              (en) | 2004-03-09 | 2010-01-05 | Gozoom.Com, Inc. | Email analysis using fuzzy matching of text | 
| US20050204159A1              (en)* | 2004-03-09 | 2005-09-15 | International Business Machines Corporation | System, method and computer program to block spam | 
| US8918466B2              (en) | 2004-03-09 | 2014-12-23 | Tonny Yu | System for email processing and analysis | 
| US7366764B1              (en)* | 2004-06-23 | 2008-04-29 | Chelonia Llc | Method for the identification and management of mass unsolicited e-mail | 
| US7693945B1              (en)* | 2004-06-30 | 2010-04-06 | Google Inc. | System for reclassification of electronic messages in a spam filtering system | 
| US7660865B2              (en)* | 2004-08-12 | 2010-02-09 | Microsoft Corporation | Spam filtering with probabilistic secure hashes | 
| US7933985B2              (en) | 2004-08-13 | 2011-04-26 | Sipera Systems, Inc. | System and method for detecting and preventing denial of service attacks in a communications system | 
| US20060047794A1              (en) | 2004-09-02 | 2006-03-02 | Microsoft Corporation | Application of genetic algorithms to computer system tuning | 
| US8010460B2              (en) | 2004-09-02 | 2011-08-30 | Linkedin Corporation | Method and system for reputation evaluation of online users in a social networking scheme | 
| US20060095404A1              (en) | 2004-10-29 | 2006-05-04 | The Go Daddy Group, Inc | Presenting search engine results based on domain name related reputation | 
| US20060095966A1              (en)* | 2004-11-03 | 2006-05-04 | Shawn Park | Method of detecting, comparing, blocking, and eliminating spam emails | 
| US7574409B2              (en)* | 2004-11-04 | 2009-08-11 | Vericept Corporation | Method, apparatus, and system for clustering and classification | 
| US20060168017A1              (en)* | 2004-11-30 | 2006-07-27 | Microsoft Corporation | Dynamic spam trap accounts | 
| US20060123083A1              (en) | 2004-12-03 | 2006-06-08 | Xerox Corporation | Adaptive spam message detector | 
| US20060149820A1              (en)* | 2005-01-04 | 2006-07-06 | International Business Machines Corporation | Detecting spam e-mail using similarity calculations | 
| US20060230039A1              (en) | 2005-01-25 | 2006-10-12 | Markmonitor, Inc. | Online identity tracking | 
| CA2600344A1              (en) | 2005-03-02 | 2006-09-08 | Markmonitor Inc. | Distribution of trust data | 
| US7822620B2              (en) | 2005-05-03 | 2010-10-26 | Mcafee, Inc. | Determining website reputations using automatic testing | 
| US20060259551A1              (en)* | 2005-05-12 | 2006-11-16 | Idalis Software | Detection of unsolicited electronic messages | 
| WO2009003059A1              (en)* | 2007-06-25 | 2008-12-31 | Google Inc. | Zero-hour quarantine of suspect electronic messages | 
| US20090083413A1              (en)* | 2007-09-24 | 2009-03-26 | Levow Zachary S | Distributed frequency data collection via DNS | 
| US8364766B2              (en)* | 2008-12-04 | 2013-01-29 | Yahoo! Inc. | Spam filtering based on statistics and token frequency modeling |