US6304973B1
(en)
*
|
1998-08-06 |
2001-10-16 |
Cryptek Secure Communications, Llc |
Multi-level security network system
|
US6438612B1
(en)
*
|
1998-09-11 |
2002-08-20 |
Ssh Communications Security, Ltd. |
Method and arrangement for secure tunneling of data between virtual routers
|
US6728885B1
(en)
*
|
1998-10-09 |
2004-04-27 |
Networks Associates Technology, Inc. |
System and method for network access control using adaptive proxies
|
AUPP660298A0
(en)
*
|
1998-10-20 |
1998-11-12 |
Canon Kabushiki Kaisha |
Apparatus and method for preventing disclosure of protected information
|
US6321338B1
(en)
|
1998-11-09 |
2001-11-20 |
Sri International |
Network surveillance
|
JP3825258B2
(en)
*
|
1999-01-14 |
2006-09-27 |
ノキア コーポレイション |
Interception method and system
|
IL128814A
(en)
*
|
1999-03-03 |
2004-09-27 |
Packet Technologies Ltd |
Local network security
|
US7596606B2
(en)
*
|
1999-03-11 |
2009-09-29 |
Codignotto John D |
Message publishing system for publishing messages from identified, authorized senders
|
US6829708B1
(en)
*
|
1999-03-27 |
2004-12-07 |
Microsoft Corporation |
Specifying security for an element by assigning a scaled value representative of the relative security thereof
|
US6711681B1
(en)
*
|
1999-05-05 |
2004-03-23 |
Sun Microsystems, Inc. |
Cryptographic authorization with prioritized authentication
|
US6865674B1
(en)
*
|
1999-06-02 |
2005-03-08 |
Entrust Technologies Limited |
Dynamic trust anchor system and method
|
US7051365B1
(en)
*
|
1999-06-30 |
2006-05-23 |
At&T Corp. |
Method and apparatus for a distributed firewall
|
US7370348B1
(en)
*
|
1999-07-30 |
2008-05-06 |
Intel Corporation |
Technique and apparatus for processing cryptographic services of data in a network system
|
US6614800B1
(en)
*
|
1999-09-02 |
2003-09-02 |
International Business Machines Corporation |
Method and system for virtual private network administration channels
|
US6549972B1
(en)
*
|
1999-11-22 |
2003-04-15 |
International Business Machines Corporation |
Method and system for providing control accesses between a device on a non-proprietary bus and a device on a proprietary bus
|
US6970941B1
(en)
|
1999-12-10 |
2005-11-29 |
Sun Microsystems, Inc. |
System and method for separating addresses from the delivery scheme in a virtual private network
|
US7336790B1
(en)
|
1999-12-10 |
2008-02-26 |
Sun Microsystems Inc. |
Decoupling access control from key management in a network
|
US6938169B1
(en)
|
1999-12-10 |
2005-08-30 |
Sun Microsystems, Inc. |
Channel-specific file system views in a private network using a public-network infrastructure
|
US7765581B1
(en)
|
1999-12-10 |
2010-07-27 |
Oracle America, Inc. |
System and method for enabling scalable security in a virtual private network
|
US6977929B1
(en)
|
1999-12-10 |
2005-12-20 |
Sun Microsystems, Inc. |
Method and system for facilitating relocation of devices on a network
|
US6775657B1
(en)
*
|
1999-12-22 |
2004-08-10 |
Cisco Technology, Inc. |
Multilayered intrusion detection system and method
|
US7836494B2
(en)
*
|
1999-12-29 |
2010-11-16 |
Intel Corporation |
System and method for regulating the flow of information to or from an application
|
AU2000269232A1
(en)
*
|
2000-01-14 |
2001-07-24 |
Microsoft Corporation |
Specifying security for an element by assigning a scaled value representative ofthe relative security thereof
|
EP1624609B1
(en)
*
|
2000-01-21 |
2011-08-24 |
Sony Computer Entertainment Inc. |
Encryption data processing apparatus and method
|
US7293175B2
(en)
*
|
2000-06-29 |
2007-11-06 |
Lockheed Martin Corporation |
Automatic information sanitizer
|
US20020156860A1
(en)
*
|
2000-02-25 |
2002-10-24 |
Finke Alan D. |
Personal server system
|
JP2001298449A
(en)
*
|
2000-04-12 |
2001-10-26 |
Matsushita Electric Ind Co Ltd |
Security communication method, communication system and its unit
|
US6922785B1
(en)
*
|
2000-05-11 |
2005-07-26 |
International Business Machines Corporation |
Apparatus and a method for secure communications for network computers
|
US7020718B2
(en)
*
|
2000-05-15 |
2006-03-28 |
Hewlett-Packard Development Company, L.P. |
System and method of aggregating discontiguous address ranges into addresses and masks using a plurality of repeating address blocks
|
US7024686B2
(en)
*
|
2000-05-15 |
2006-04-04 |
Hewlett-Packard Development Company, L.P. |
Secure network and method of establishing communication amongst network devices that have restricted network connectivity
|
US20010037384A1
(en)
*
|
2000-05-15 |
2001-11-01 |
Brian Jemes |
System and method for implementing a virtual backbone on a common network infrastructure
|
US7263719B2
(en)
*
|
2000-05-15 |
2007-08-28 |
Hewlett-Packard Development Company, L.P. |
System and method for implementing network security policies on a common network infrastructure
|
AU5999201A
(en)
|
2000-05-17 |
2001-11-26 |
Canadian Inst Of Chartered Acc |
Continuously updated data processing system and method for measuring and reporting on value creation performance
|
US7134141B2
(en)
*
|
2000-06-12 |
2006-11-07 |
Hewlett-Packard Development Company, L.P. |
System and method for host and network based intrusion detection and response
|
US7007301B2
(en)
*
|
2000-06-12 |
2006-02-28 |
Hewlett-Packard Development Company, L.P. |
Computer architecture for an intrusion detection system
|
US20040073617A1
(en)
|
2000-06-19 |
2004-04-15 |
Milliken Walter Clark |
Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
|
KR100358387B1
(en)
*
|
2000-06-27 |
2002-10-25 |
엘지전자 주식회사 |
Apparatus for extended firewall protecting internal resources in network system
|
US20060031456A1
(en)
*
|
2000-07-31 |
2006-02-09 |
Marcos Della |
Method and apparatus for transmitting data between devices in a web networking environment
|
US7062570B2
(en)
*
|
2000-08-04 |
2006-06-13 |
Avaya Technology, Corp. |
High performance server farm with tagging and pipelining
|
US8037530B1
(en)
|
2000-08-28 |
2011-10-11 |
Verizon Corporate Services Group Inc. |
Method and apparatus for providing adaptive self-synchronized dynamic address translation as an intrusion detection sensor
|
WO2002019077A2
(en)
|
2000-09-01 |
2002-03-07 |
Sri International, Inc. |
Probabilistic alert correlation
|
US9027121B2
(en)
|
2000-10-10 |
2015-05-05 |
International Business Machines Corporation |
Method and system for creating a record for one or more computer security incidents
|
US6941350B1
(en)
|
2000-10-19 |
2005-09-06 |
International Business Machines Corporation |
Method and apparatus for reliably choosing a master network manager during initialization of a network computing system
|
US6981025B1
(en)
|
2000-10-19 |
2005-12-27 |
International Business Machines Corporation |
Method and apparatus for ensuring scalable mastership during initialization of a system area network
|
US7113995B1
(en)
*
|
2000-10-19 |
2006-09-26 |
International Business Machines Corporation |
Method and apparatus for reporting unauthorized attempts to access nodes in a network computing system
|
US6978300B1
(en)
|
2000-10-19 |
2005-12-20 |
International Business Machines Corporation |
Method and apparatus to perform fabric management
|
US6990528B1
(en)
|
2000-10-19 |
2006-01-24 |
International Business Machines Corporation |
System area network of end-to-end context via reliable datagram domains
|
US7099955B1
(en)
|
2000-10-19 |
2006-08-29 |
International Business Machines Corporation |
End node partitioning using LMC for a system area network
|
US7636772B1
(en)
|
2000-10-19 |
2009-12-22 |
International Business Machines Corporation |
Method and apparatus for dynamic retention of system area network management information in non-volatile store
|
US7054930B1
(en)
*
|
2000-10-26 |
2006-05-30 |
Cisco Technology, Inc. |
System and method for propagating filters
|
US7213265B2
(en)
*
|
2000-11-15 |
2007-05-01 |
Lockheed Martin Corporation |
Real time active network compartmentalization
|
US7225467B2
(en)
*
|
2000-11-15 |
2007-05-29 |
Lockheed Martin Corporation |
Active intrusion resistant environment of layered object and compartment keys (airelock)
|
JP5044868B2
(en)
*
|
2000-11-17 |
2012-10-10 |
富士通セミコンダクター株式会社 |
Semiconductor device and multichip module
|
US6986061B1
(en)
*
|
2000-11-20 |
2006-01-10 |
International Business Machines Corporation |
Integrated system for network layer security and fine-grained identity-based access control
|
US7073173B1
(en)
*
|
2000-12-04 |
2006-07-04 |
Microsoft Corporation |
Code and thread differential addressing via multiplex page maps
|
US20020073257A1
(en)
*
|
2000-12-07 |
2002-06-13 |
Ibm Corporation |
Transferring foreign protocols across a system area network
|
US20020124069A1
(en)
*
|
2000-12-28 |
2002-09-05 |
Hatalkar Atul N. |
Broadcast communication system with dynamic client-group memberships
|
US7131140B1
(en)
|
2000-12-29 |
2006-10-31 |
Cisco Technology, Inc. |
Method for protecting a firewall load balancer from a denial of service attack
|
US6931529B2
(en)
*
|
2001-01-05 |
2005-08-16 |
International Business Machines Corporation |
Establishing consistent, end-to-end protection for a user datagram
|
US7168093B2
(en)
*
|
2001-01-25 |
2007-01-23 |
Solutionary, Inc. |
Method and apparatus for verifying the integrity and security of computer networks and implementation of counter measures
|
FI20010267A0
(en)
*
|
2001-02-13 |
2001-02-13 |
Stonesoft Oy |
Synchronization of security gateway status information
|
EP1233346A1
(en)
*
|
2001-02-14 |
2002-08-21 |
Micronas GmbH |
Network co-processor for automotive vehicle
|
US7284267B1
(en)
*
|
2001-03-08 |
2007-10-16 |
Mcafee, Inc. |
Automatically configuring a computer firewall based on network connection
|
US20020138417A1
(en)
*
|
2001-03-20 |
2002-09-26 |
David Lawrence |
Risk management clearinghouse
|
US20050177640A1
(en)
*
|
2001-03-20 |
2005-08-11 |
Alan Rubinstein |
Method for selectively providing access to voice and data networks by use of intelligent hardware
|
US7899722B1
(en)
|
2001-03-20 |
2011-03-01 |
Goldman Sachs & Co. |
Correspondent bank registry
|
US8285615B2
(en)
|
2001-03-20 |
2012-10-09 |
Goldman, Sachs & Co. |
Construction industry risk management clearinghouse
|
US7287280B2
(en)
*
|
2002-02-12 |
2007-10-23 |
Goldman Sachs & Co. |
Automated security management
|
US8069105B2
(en)
|
2001-03-20 |
2011-11-29 |
Goldman Sachs & Co. |
Hedge fund risk management
|
US8121937B2
(en)
|
2001-03-20 |
2012-02-21 |
Goldman Sachs & Co. |
Gaming industry risk management clearinghouse
|
US8209246B2
(en)
|
2001-03-20 |
2012-06-26 |
Goldman, Sachs & Co. |
Proprietary risk management clearinghouse
|
US7548883B2
(en)
*
|
2001-03-20 |
2009-06-16 |
Goldman Sachs & Co |
Construction industry risk management clearinghouse
|
US7904361B2
(en)
|
2001-03-20 |
2011-03-08 |
Goldman Sachs & Co. |
Risk management customer registry
|
US8140415B2
(en)
|
2001-03-20 |
2012-03-20 |
Goldman Sachs & Co. |
Automated global risk management
|
US7958027B2
(en)
|
2001-03-20 |
2011-06-07 |
Goldman, Sachs & Co. |
Systems and methods for managing risk associated with a geo-political area
|
FR2823936B1
(en)
*
|
2001-04-19 |
2003-05-30 |
France Telecom |
METHOD AND SYSTEM FOR CONDITIONAL ACCESS TO IP SERVICES
|
US20020154635A1
(en)
*
|
2001-04-23 |
2002-10-24 |
Sun Microsystems, Inc. |
System and method for extending private networks onto public infrastructure using supernets
|
US20060265746A1
(en)
|
2001-04-27 |
2006-11-23 |
Internet Security Systems, Inc. |
Method and system for managing computer security information
|
TW541467B
(en)
*
|
2001-05-11 |
2003-07-11 |
Mitac Int Corp |
Knowledge management system and method
|
US20020198994A1
(en)
*
|
2001-05-15 |
2002-12-26 |
Charles Patton |
Method and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment
|
EP1402388A4
(en)
*
|
2001-06-04 |
2005-03-16 |
Nct Group Inc |
System and method for modifying a data stream using element parsing
|
US20020199013A1
(en)
*
|
2001-06-25 |
2002-12-26 |
Sorensen Lauge S. |
Method and apparatus for moving HTML/XML information into a HTTP header in a network
|
US7590684B2
(en)
*
|
2001-07-06 |
2009-09-15 |
Check Point Software Technologies, Inc. |
System providing methodology for access control with cooperative enforcement
|
US8200818B2
(en)
*
|
2001-07-06 |
2012-06-12 |
Check Point Software Technologies, Inc. |
System providing internet access management with router-based policy enforcement
|
US20040107360A1
(en)
*
|
2002-12-02 |
2004-06-03 |
Zone Labs, Inc. |
System and Methodology for Policy Enforcement
|
US20030018910A1
(en)
*
|
2001-07-18 |
2003-01-23 |
Ge Capital Mortgage Corporation |
System and methods for providing multi-level security in a network at the application level
|
US20030046532A1
(en)
*
|
2001-08-31 |
2003-03-06 |
Matthew Gast |
System and method for accelerating cryptographically secured transactions
|
JP2003087238A
(en)
*
|
2001-09-11 |
2003-03-20 |
Hitachi Ltd |
Security realizing system in domestic network
|
US7433826B2
(en)
*
|
2001-09-19 |
2008-10-07 |
Eleytheria, Ltd |
System and method for identity validation for a regulated transaction
|
US20030196097A1
(en)
*
|
2001-09-19 |
2003-10-16 |
Korosec Jason A. |
System and method for airport security employing identity validation
|
US7302700B2
(en)
|
2001-09-28 |
2007-11-27 |
Juniper Networks, Inc. |
Method and apparatus for implementing a layer 3/layer 7 firewall in an L2 device
|
US20030065723A1
(en)
*
|
2001-09-28 |
2003-04-03 |
Kumhyr David B. |
Computer-based communication using multiple communications channels
|
US7516408B2
(en)
*
|
2001-09-28 |
2009-04-07 |
International Business Machines Corporation |
Method, system and program for switching between various computer-based communication techniques
|
US6975996B2
(en)
*
|
2001-10-09 |
2005-12-13 |
Goldman, Sachs & Co. |
Electronic subpoena service
|
GB2370732B
(en)
*
|
2001-10-17 |
2003-12-10 |
Ericsson Telefon Ab L M |
Security in communications networks
|
US7167918B2
(en)
*
|
2001-10-29 |
2007-01-23 |
Sun Microsystems, Inc. |
Macro-based access control
|
US7444679B2
(en)
*
|
2001-10-31 |
2008-10-28 |
Hewlett-Packard Development Company, L.P. |
Network, method and computer readable medium for distributing security updates to select nodes on a network
|
US20030084340A1
(en)
*
|
2001-10-31 |
2003-05-01 |
Schertz Richard L. |
System and method of graphically displaying data for an intrusion protection system
|
US20030093689A1
(en)
*
|
2001-11-15 |
2003-05-15 |
Aladdin Knowledge Systems Ltd. |
Security router
|
US7370366B2
(en)
*
|
2001-11-16 |
2008-05-06 |
International Business Machines Corporation |
Data management system and method
|
US20030177087A1
(en)
*
|
2001-11-28 |
2003-09-18 |
David Lawrence |
Transaction surveillance
|
US8316051B1
(en)
*
|
2001-11-30 |
2012-11-20 |
Oralce International Corporation |
Techniques for adding multiple security policies to a database system
|
US20030105830A1
(en)
*
|
2001-12-03 |
2003-06-05 |
Duc Pham |
Scalable network media access controller and methods
|
JP4051924B2
(en)
|
2001-12-05 |
2008-02-27 |
株式会社日立製作所 |
Network system capable of transmission control
|
US7986937B2
(en)
*
|
2001-12-20 |
2011-07-26 |
Microsoft Corporation |
Public access point
|
US7120791B2
(en)
*
|
2002-01-25 |
2006-10-10 |
Cranite Systems, Inc. |
Bridged cryptographic VLAN
|
US7188364B2
(en)
*
|
2001-12-20 |
2007-03-06 |
Cranite Systems, Inc. |
Personal virtual bridged local area networks
|
US7610332B2
(en)
*
|
2002-01-15 |
2009-10-27 |
Nortel Networks Limited |
Overlay networks
|
KR100438431B1
(en)
*
|
2002-02-23 |
2004-07-03 |
삼성전자주식회사 |
Security system for virtual private network service access in communication network and method thereof
|
US7903549B2
(en)
|
2002-03-08 |
2011-03-08 |
Secure Computing Corporation |
Content-based policy compliance systems and methods
|
US20030172291A1
(en)
|
2002-03-08 |
2003-09-11 |
Paul Judge |
Systems and methods for automated whitelisting in monitored communications
|
US8561167B2
(en)
|
2002-03-08 |
2013-10-15 |
Mcafee, Inc. |
Web reputation scoring
|
US7870203B2
(en)
|
2002-03-08 |
2011-01-11 |
Mcafee, Inc. |
Methods and systems for exposing messaging reputation to an end user
|
US7124438B2
(en)
|
2002-03-08 |
2006-10-17 |
Ciphertrust, Inc. |
Systems and methods for anomaly detection in patterns of monitored communications
|
US7694128B2
(en)
|
2002-03-08 |
2010-04-06 |
Mcafee, Inc. |
Systems and methods for secure communication delivery
|
US7693947B2
(en)
|
2002-03-08 |
2010-04-06 |
Mcafee, Inc. |
Systems and methods for graphically displaying messaging traffic
|
US8132250B2
(en)
|
2002-03-08 |
2012-03-06 |
Mcafee, Inc. |
Message profiling systems and methods
|
US20060015942A1
(en)
|
2002-03-08 |
2006-01-19 |
Ciphertrust, Inc. |
Systems and methods for classification of messaging entities
|
US8578480B2
(en)
|
2002-03-08 |
2013-11-05 |
Mcafee, Inc. |
Systems and methods for identifying potentially malicious messages
|
US6845452B1
(en)
*
|
2002-03-12 |
2005-01-18 |
Reactivity, Inc. |
Providing security for external access to a protected computer network
|
US7822980B2
(en)
*
|
2002-03-15 |
2010-10-26 |
International Business Machines Corporation |
Authenticated identity propagation and translation within a multiple computing unit environment
|
US7185365B2
(en)
*
|
2002-03-27 |
2007-02-27 |
Intel Corporation |
Security enabled network access control
|
US7188365B2
(en)
*
|
2002-04-04 |
2007-03-06 |
At&T Corp. |
Method and system for securely scanning network traffic
|
US7203957B2
(en)
*
|
2002-04-04 |
2007-04-10 |
At&T Corp. |
Multipoint server for providing secure, scaleable connections between a plurality of network devices
|
WO2003088532A1
(en)
*
|
2002-04-11 |
2003-10-23 |
The Johns Hopkins University |
Intrusion detection system for wireless networks
|
US7072657B2
(en)
*
|
2002-04-11 |
2006-07-04 |
Ntt Docomo, Inc. |
Method and associated apparatus for pre-authentication, preestablished virtual private network in heterogeneous access networks
|
TW569587B
(en)
*
|
2002-04-19 |
2004-01-01 |
Ru-Fang Shiau |
Setup method of wireless network device
|
US7546458B1
(en)
*
|
2002-05-04 |
2009-06-09 |
Atheros Communications, Inc. |
Method for organizing virtual networks while optimizing security
|
US20030212901A1
(en)
*
|
2002-05-13 |
2003-11-13 |
Manav Mishra |
Security enabled network flow control
|
US7284268B2
(en)
|
2002-05-16 |
2007-10-16 |
Meshnetworks, Inc. |
System and method for a routing device to securely share network data with a host utilizing a hardware firewall
|
US7277404B2
(en)
*
|
2002-05-20 |
2007-10-02 |
Airdefense, Inc. |
System and method for sensing wireless LAN activity
|
US20040203764A1
(en)
*
|
2002-06-03 |
2004-10-14 |
Scott Hrastar |
Methods and systems for identifying nodes and mapping their locations
|
US7383577B2
(en)
*
|
2002-05-20 |
2008-06-03 |
Airdefense, Inc. |
Method and system for encrypted network management and intrusion detection
|
US7058796B2
(en)
|
2002-05-20 |
2006-06-06 |
Airdefense, Inc. |
Method and system for actively defending a wireless LAN against attacks
|
US7042852B2
(en)
*
|
2002-05-20 |
2006-05-09 |
Airdefense, Inc. |
System and method for wireless LAN dynamic channel change with honeypot trap
|
US7086089B2
(en)
*
|
2002-05-20 |
2006-08-01 |
Airdefense, Inc. |
Systems and methods for network security
|
US7532895B2
(en)
|
2002-05-20 |
2009-05-12 |
Air Defense, Inc. |
Systems and methods for adaptive location tracking
|
US7322044B2
(en)
|
2002-06-03 |
2008-01-22 |
Airdefense, Inc. |
Systems and methods for automated network policy exception detection and correction
|
US7415723B2
(en)
*
|
2002-06-11 |
2008-08-19 |
Pandya Ashish A |
Distributed network security system and a hardware processor therefor
|
US7631107B2
(en)
*
|
2002-06-11 |
2009-12-08 |
Pandya Ashish A |
Runtime adaptable protocol processor
|
US7627693B2
(en)
*
|
2002-06-11 |
2009-12-01 |
Pandya Ashish A |
IP storage processor and engine therefor using RDMA
|
AU2003276819A1
(en)
|
2002-06-13 |
2003-12-31 |
Engedi Technologies, Inc. |
Out-of-band remote management station
|
US7325140B2
(en)
*
|
2003-06-13 |
2008-01-29 |
Engedi Technologies, Inc. |
Secure management access control for computers, embedded and card embodiment
|
US20040003230A1
(en)
*
|
2002-06-28 |
2004-01-01 |
Puhl Larry C. |
Method and system for vehicle authentication of a service technician
|
US7302488B2
(en)
*
|
2002-06-28 |
2007-11-27 |
Microsoft Corporation |
Parental controls customization and notification
|
US7334124B2
(en)
|
2002-07-22 |
2008-02-19 |
Vormetric, Inc. |
Logical access block processing protocol for transparent secure file storage
|
US6931530B2
(en)
|
2002-07-22 |
2005-08-16 |
Vormetric, Inc. |
Secure network file access controller implementing access control and auditing
|
US7356695B2
(en)
*
|
2002-08-01 |
2008-04-08 |
International Business Machines Corporation |
Multi-level security systems
|
US20040030931A1
(en)
*
|
2002-08-12 |
2004-02-12 |
Chamandy Alexander G. |
System and method for providing enhanced network security
|
US7958351B2
(en)
*
|
2002-08-29 |
2011-06-07 |
Wisterium Development Llc |
Method and apparatus for multi-level security implementation
|
US7353532B2
(en)
*
|
2002-08-30 |
2008-04-01 |
International Business Machines Corporation |
Secure system and method for enforcement of privacy policy and protection of confidentiality
|
US7401352B2
(en)
*
|
2002-08-30 |
2008-07-15 |
International Business Machines Corporation |
Secure system and method for enforcement of privacy policy and protection of confidentiality
|
US7596806B2
(en)
*
|
2002-09-06 |
2009-09-29 |
O2Micro International Limited |
VPN and firewall integrated system
|
GB2407464B
(en)
*
|
2002-09-06 |
2005-12-14 |
O2Micro Inc |
VPN and firewall integrated system
|
US20100138909A1
(en)
*
|
2002-09-06 |
2010-06-03 |
O2Micro, Inc. |
Vpn and firewall integrated system
|
US7695071B2
(en)
|
2002-10-15 |
2010-04-13 |
Minister Of Natural Resources |
Automated excavation machine
|
US7143288B2
(en)
*
|
2002-10-16 |
2006-11-28 |
Vormetric, Inc. |
Secure file system server architecture and methods
|
US6850943B2
(en)
*
|
2002-10-18 |
2005-02-01 |
Check Point Software Technologies, Inc. |
Security system and methodology for providing indirect access control
|
US8327436B2
(en)
*
|
2002-10-25 |
2012-12-04 |
Randle William M |
Infrastructure architecture for secure network management with peer to peer functionality
|
US7080094B2
(en)
*
|
2002-10-29 |
2006-07-18 |
Lockheed Martin Corporation |
Hardware accelerated validating parser
|
US7146643B2
(en)
|
2002-10-29 |
2006-12-05 |
Lockheed Martin Corporation |
Intrusion detection accelerator
|
US20050177537A1
(en)
*
|
2002-10-31 |
2005-08-11 |
Thompson Robert B.Jr. |
System and method for integrating existing computer-based systems
|
US7574738B2
(en)
|
2002-11-06 |
2009-08-11 |
At&T Intellectual Property Ii, L.P. |
Virtual private network crossovers based on certificates
|
US20040098616A1
(en)
*
|
2002-11-14 |
2004-05-20 |
Jenner Bruce Stephen |
Communications firewall
|
WO2004047082A2
(en)
*
|
2002-11-14 |
2004-06-03 |
Goldman, Sachs & Co. |
Independent research consensus earnings estimates and methods of determining such
|
US20040103317A1
(en)
*
|
2002-11-22 |
2004-05-27 |
Burns William D. |
Method and apparatus for protecting secure credentials on an untrusted computer platform
|
US20040123139A1
(en)
*
|
2002-12-18 |
2004-06-24 |
At&T Corp. |
System having filtering/monitoring of secure connections
|
US6836798B1
(en)
*
|
2002-12-31 |
2004-12-28 |
Sprint Communications Company, L.P. |
Network model reconciliation using state analysis
|
US7320069B1
(en)
*
|
2003-02-14 |
2008-01-15 |
Novell, Inc. |
Selective encryption of media data
|
US7610618B2
(en)
*
|
2003-02-24 |
2009-10-27 |
Bea Systems, Inc. |
System and method for authenticating a subject
|
US7017051B2
(en)
*
|
2003-02-24 |
2006-03-21 |
Bea Systems, Inc. |
System and method for enterprise authentication
|
US7370212B2
(en)
|
2003-02-25 |
2008-05-06 |
Microsoft Corporation |
Issuing a publisher use license off-line in a digital rights management (DRM) system
|
US7490348B1
(en)
*
|
2003-03-17 |
2009-02-10 |
Harris Technology, Llc |
Wireless network having multiple communication allowances
|
US7389345B1
(en)
|
2003-03-26 |
2008-06-17 |
Sprint Communications Company L.P. |
Filtering approach for network system alarms
|
US8136155B2
(en)
*
|
2003-04-01 |
2012-03-13 |
Check Point Software Technologies, Inc. |
Security system with methodology for interprocess communication control
|
US7355996B2
(en)
*
|
2004-02-06 |
2008-04-08 |
Airdefense, Inc. |
Systems and methods for adaptive monitoring with bandwidth constraints
|
US7359676B2
(en)
|
2003-04-21 |
2008-04-15 |
Airdefense, Inc. |
Systems and methods for adaptively scanning for wireless communications
|
US7324804B2
(en)
|
2003-04-21 |
2008-01-29 |
Airdefense, Inc. |
Systems and methods for dynamic sensor discovery and selection
|
US7522908B2
(en)
|
2003-04-21 |
2009-04-21 |
Airdefense, Inc. |
Systems and methods for wireless network site survey
|
US7421493B1
(en)
|
2003-04-28 |
2008-09-02 |
Sprint Communications Company L.P. |
Orphaned network resource recovery through targeted audit and reconciliation
|
EP1473899A1
(en)
*
|
2003-04-28 |
2004-11-03 |
Telefonaktiebolaget LM Ericsson (publ) |
Security in a communications network
|
US7900038B2
(en)
*
|
2003-04-29 |
2011-03-01 |
Wells Fargo Bank, N.A. |
Method and apparatus for a broker entity
|
US7020771B2
(en)
*
|
2003-05-05 |
2006-03-28 |
Cisco Technology, Inc. |
Controlling data security procedures using an admission control signaling protocol
|
US7404203B2
(en)
*
|
2003-05-06 |
2008-07-22 |
Oracle International Corporation |
Distributed capability-based authorization architecture
|
WO2004107130A2
(en)
*
|
2003-05-28 |
2004-12-09 |
Caymas Systems, Inc. |
Multilayer access control security system
|
US7281265B1
(en)
|
2003-06-02 |
2007-10-09 |
Cisco Technology, Inc. |
System and method for communicating packets in a network environment
|
US7685254B2
(en)
*
|
2003-06-10 |
2010-03-23 |
Pandya Ashish A |
Runtime adaptable search processor
|
US20040260946A1
(en)
*
|
2003-06-20 |
2004-12-23 |
Cahill Conor P. |
User not present
|
US7493393B2
(en)
*
|
2003-06-23 |
2009-02-17 |
Nokia Corporation |
Apparatus and method for security management in wireless IP networks
|
US7526640B2
(en)
*
|
2003-06-30 |
2009-04-28 |
Microsoft Corporation |
System and method for automatic negotiation of a security protocol
|
US7788726B2
(en)
*
|
2003-07-02 |
2010-08-31 |
Check Point Software Technologies, Inc. |
System and methodology providing information lockbox
|
US20050114700A1
(en)
*
|
2003-08-13 |
2005-05-26 |
Sensory Networks, Inc. |
Integrated circuit apparatus and method for high throughput signature based network applications
|
US7302569B2
(en)
*
|
2003-08-19 |
2007-11-27 |
International Business Machines Corporation |
Implementation and use of a PII data access control facility employing personally identifying information labels and purpose serving functions sets
|
US7734844B2
(en)
*
|
2003-08-19 |
2010-06-08 |
General Dynamics Advanced Information Systems, Inc. |
Trusted interface unit (TIU) and method of making and using the same
|
US7530112B2
(en)
|
2003-09-10 |
2009-05-05 |
Cisco Technology, Inc. |
Method and apparatus for providing network security using role-based access control
|
WO2005026872A2
(en)
*
|
2003-09-16 |
2005-03-24 |
Terassic-5 Infosec Ltd |
Internal lan perimeter security appliance composed of a pci card and complementary software
|
WO2005031523A2
(en)
|
2003-09-23 |
2005-04-07 |
Lockheed Martin Corporation |
Systems and methods for sharing data between entities
|
US7523484B2
(en)
*
|
2003-09-24 |
2009-04-21 |
Infoexpress, Inc. |
Systems and methods of controlling network access
|
US7519826B2
(en)
*
|
2003-10-01 |
2009-04-14 |
Engedi Technologies, Inc. |
Near real-time multi-party task authorization access control
|
US7451483B2
(en)
*
|
2003-10-09 |
2008-11-11 |
International Business Machines Corporation |
VLAN router with firewall supporting multiple security layers
|
WO2005043304A2
(en)
*
|
2003-10-21 |
2005-05-12 |
Engedi Technologies, Inc. |
Secure management access control for computers, embedded and card embodiment
|
US7523301B2
(en)
*
|
2003-10-28 |
2009-04-21 |
Rsa Security |
Inferring content sensitivity from partial content matching
|
US7954151B1
(en)
|
2003-10-28 |
2011-05-31 |
Emc Corporation |
Partial document content matching using sectional analysis
|
US7836490B2
(en)
*
|
2003-10-29 |
2010-11-16 |
Cisco Technology, Inc. |
Method and apparatus for providing network security using security labeling
|
DE10352071A1
(en)
*
|
2003-11-07 |
2005-06-23 |
Daimlerchrysler Ag |
Method for detecting unauthorized component exchange
|
US20050102534A1
(en)
*
|
2003-11-12 |
2005-05-12 |
Wong Joseph D. |
System and method for auditing the security of an enterprise
|
US20050108434A1
(en)
*
|
2003-11-13 |
2005-05-19 |
Witchey Nicholas J. |
In-band firewall for an embedded system
|
US8010789B2
(en)
|
2003-11-13 |
2011-08-30 |
Lantronix, Inc. |
Secure data transfer using an embedded system
|
US7797752B1
(en)
*
|
2003-12-17 |
2010-09-14 |
Vimal Vaidya |
Method and apparatus to secure a computing environment
|
FR2865335A1
(en)
*
|
2004-01-16 |
2005-07-22 |
France Telecom |
Internal and external internet protocol terminals communication system, has control server that is provided in public IP network and that controls mediation system via communication channel passing via firewall
|
GB0404444D0
(en)
*
|
2004-02-27 |
2004-09-01 |
Bae Sys Defence Sys Ltd |
Secure computer communication
|
GB0404517D0
(en)
*
|
2004-03-01 |
2004-03-31 |
Qinetiq Ltd |
Threat mitigation in computer networks
|
US7549048B2
(en)
*
|
2004-03-19 |
2009-06-16 |
Microsoft Corporation |
Efficient and secure authentication of computing systems
|
US20050257047A1
(en)
*
|
2004-05-17 |
2005-11-17 |
Alcatel |
Network equipment with embedded movable secure devices
|
US8136149B2
(en)
*
|
2004-06-07 |
2012-03-13 |
Check Point Software Technologies, Inc. |
Security system with methodology providing verified secured individual end points
|
US7243235B2
(en)
|
2004-06-08 |
2007-07-10 |
Matsushita Electric Industrial Co., Ltd. |
Mandatory access control (MAC) method
|
US7457244B1
(en)
|
2004-06-24 |
2008-11-25 |
Cisco Technology, Inc. |
System and method for generating a traffic matrix in a network environment
|
US7760882B2
(en)
*
|
2004-06-28 |
2010-07-20 |
Japan Communications, Inc. |
Systems and methods for mutual authentication of network nodes
|
US20060026268A1
(en)
*
|
2004-06-28 |
2006-02-02 |
Sanda Frank S |
Systems and methods for enhancing and optimizing a user's experience on an electronic device
|
US7552186B2
(en)
|
2004-06-28 |
2009-06-23 |
International Business Machines Corporation |
Method and system for filtering spam using an adjustable reliability value
|
WO2006012044A1
(en)
*
|
2004-06-28 |
2006-02-02 |
Japan Communications, Inc. |
Methods and systems for encrypting, transmitting, and storing electronic information and files
|
US8510300B2
(en)
|
2004-07-02 |
2013-08-13 |
Goldman, Sachs & Co. |
Systems and methods for managing information associated with legal, compliance and regulatory risk
|
US8762191B2
(en)
|
2004-07-02 |
2014-06-24 |
Goldman, Sachs & Co. |
Systems, methods, apparatus, and schema for storing, managing and retrieving information
|
US8442953B2
(en)
|
2004-07-02 |
2013-05-14 |
Goldman, Sachs & Co. |
Method, system, apparatus, program code and means for determining a redundancy of information
|
US8996481B2
(en)
|
2004-07-02 |
2015-03-31 |
Goldman, Sach & Co. |
Method, system, apparatus, program code and means for identifying and extracting information
|
US7917627B1
(en)
|
2004-07-12 |
2011-03-29 |
Cisco Technology, Inc. |
System and method for providing security in a network environment
|
US8312530B2
(en)
*
|
2004-07-12 |
2012-11-13 |
Cisco Technology, Inc. |
System and method for providing security in a network environment using accounting information
|
US7607011B1
(en)
*
|
2004-07-16 |
2009-10-20 |
Rockwell Collins, Inc. |
System and method for multi-level security on a network
|
US7624435B1
(en)
*
|
2004-07-26 |
2009-11-24 |
Trend Micro Incorporated |
Method and apparatus for managing digital assets
|
US8661420B2
(en)
*
|
2004-08-03 |
2014-02-25 |
Oracle International Corporation |
System and method for runtime interface versioning
|
US8217756B2
(en)
*
|
2004-09-01 |
2012-07-10 |
Microsoft Corporation |
Rule-based filtering and alerting
|
US7382260B2
(en)
*
|
2004-09-01 |
2008-06-03 |
Microsoft Corporation |
Hot swap and plug-and-play for RFID devices
|
US8098158B2
(en)
*
|
2004-09-01 |
2012-01-17 |
Microsoft Corporation |
RFID server internals design
|
US7600117B2
(en)
*
|
2004-09-29 |
2009-10-06 |
Panasonic Corporation |
Mandatory access control scheme with active objects
|
US8196199B2
(en)
|
2004-10-19 |
2012-06-05 |
Airdefense, Inc. |
Personal wireless monitoring agent
|
US7669244B2
(en)
*
|
2004-10-21 |
2010-02-23 |
Cisco Technology, Inc. |
Method and system for generating user group permission lists
|
US8635690B2
(en)
|
2004-11-05 |
2014-01-21 |
Mcafee, Inc. |
Reputation based message processing
|
US7877796B2
(en)
*
|
2004-11-16 |
2011-01-25 |
Cisco Technology, Inc. |
Method and apparatus for best effort propagation of security group information
|
US7721323B2
(en)
|
2004-11-23 |
2010-05-18 |
Cisco Technology, Inc. |
Method and system for including network security information in a frame
|
US7886145B2
(en)
*
|
2004-11-23 |
2011-02-08 |
Cisco Technology, Inc. |
Method and system for including security information with a packet
|
US7827402B2
(en)
|
2004-12-01 |
2010-11-02 |
Cisco Technology, Inc. |
Method and apparatus for ingress filtering using security group information
|
US7549162B2
(en)
*
|
2004-12-06 |
2009-06-16 |
At&T Intellectual Property I, L.P. |
Methods of providing security for data distributions in a data network and related devices, networks, and computer program products
|
US7636939B2
(en)
*
|
2004-12-10 |
2009-12-22 |
Microsoft Corporation |
Endpoint identification and security
|
US20060133412A1
(en)
*
|
2004-12-22 |
2006-06-22 |
Rockwell Automation Technologies, Inc. |
Integration of control and business applications using integration servers
|
US7627896B2
(en)
*
|
2004-12-24 |
2009-12-01 |
Check Point Software Technologies, Inc. |
Security system providing methodology for cooperative enforcement of security policies during SSL sessions
|
US20060167818A1
(en)
*
|
2005-01-21 |
2006-07-27 |
David Wentker |
Methods and system for performing data exchanges related to financial transactions over a public network
|
US8825804B2
(en)
|
2005-01-26 |
2014-09-02 |
International Business Machines Corporation |
Method and system for avoiding an unintentional time-out for communications in a client-proxy-server environment
|
JP2008537193A
(en)
*
|
2005-01-31 |
2008-09-11 |
アベット テクノロジーズ,エルエルシー |
Secure computer system
|
US7752659B2
(en)
*
|
2005-02-14 |
2010-07-06 |
Lenovo (Singapore) Pte. Ltd. |
Packet filtering in a NIC to control antidote loading
|
US7706895B2
(en)
*
|
2005-02-25 |
2010-04-27 |
Rockwell Automation Technologies, Inc. |
Reliable messaging instruction
|
US7808897B1
(en)
|
2005-03-01 |
2010-10-05 |
International Business Machines Corporation |
Fast network security utilizing intrusion prevention systems
|
US7565351B1
(en)
|
2005-03-14 |
2009-07-21 |
Rockwell Automation Technologies, Inc. |
Automation device data interface
|
US8725646B2
(en)
|
2005-04-15 |
2014-05-13 |
Microsoft Corporation |
Output protection levels
|
US20060265758A1
(en)
|
2005-05-20 |
2006-11-23 |
Microsoft Corporation |
Extensible media rights
|
US7233830B1
(en)
*
|
2005-05-31 |
2007-06-19 |
Rockwell Automation Technologies, Inc. |
Application and service management for industrial control devices
|
US7937480B2
(en)
|
2005-06-02 |
2011-05-03 |
Mcafee, Inc. |
Aggregation of reputation data
|
US20070245413A1
(en)
*
|
2005-07-05 |
2007-10-18 |
Viasat, Inc. |
Trusted Cryptographic Switch
|
US20070011452A1
(en)
*
|
2005-07-08 |
2007-01-11 |
Alcatel |
Multi-level and multi-factor security credentials management for network element authentication
|
US20070025342A1
(en)
*
|
2005-07-14 |
2007-02-01 |
Gemini Mobile Technology, Inc. |
Protocol optimization for wireless networks
|
US8056124B2
(en)
*
|
2005-07-15 |
2011-11-08 |
Microsoft Corporation |
Automatically generating rules for connection security
|
US7958346B2
(en)
*
|
2005-08-18 |
2011-06-07 |
Oracle International Corp. |
Multilayered security for systems interacting with configuration items
|
WO2007032996A2
(en)
*
|
2005-09-07 |
2007-03-22 |
Ace*Comm Corporation |
Consumer configurable mobile communication solution
|
US7590733B2
(en)
*
|
2005-09-14 |
2009-09-15 |
Infoexpress, Inc. |
Dynamic address assignment for access control on DHCP networks
|
US8250229B2
(en)
*
|
2005-09-29 |
2012-08-21 |
International Business Machines Corporation |
Internet protocol security (IPSEC) packet processing for multiple clients sharing a single network address
|
US7969966B2
(en)
*
|
2005-12-19 |
2011-06-28 |
Alcatel Lucent |
System and method for port mapping in a communications network switch
|
US8499330B1
(en)
|
2005-11-15 |
2013-07-30 |
At&T Intellectual Property Ii, L.P. |
Enterprise desktop security management and compliance verification system and method
|
US7577424B2
(en)
|
2005-12-19 |
2009-08-18 |
Airdefense, Inc. |
Systems and methods for wireless vulnerability analysis
|
US7715800B2
(en)
|
2006-01-13 |
2010-05-11 |
Airdefense, Inc. |
Systems and methods for wireless intrusion detection using spectral analysis
|
US20070192858A1
(en)
*
|
2006-02-16 |
2007-08-16 |
Infoexpress, Inc. |
Peer based network access control
|
US20070192500A1
(en)
*
|
2006-02-16 |
2007-08-16 |
Infoexpress, Inc. |
Network access control including dynamic policy enforcement point
|
US8065393B2
(en)
*
|
2006-02-24 |
2011-11-22 |
Cisco Technology, Inc. |
Method and system for obviating redundant actions in a network
|
US8510812B2
(en)
|
2006-03-15 |
2013-08-13 |
Fortinet, Inc. |
Computerized system and method for deployment of management tunnels
|
US7971251B2
(en)
|
2006-03-17 |
2011-06-28 |
Airdefense, Inc. |
Systems and methods for wireless security using distributed collaboration of wireless clients
|
US8533338B2
(en)
|
2006-03-21 |
2013-09-10 |
Japan Communications, Inc. |
Systems and methods for providing secure communications for transactions
|
US8161281B1
(en)
*
|
2006-04-13 |
2012-04-17 |
Rockwell Collins, Inc. |
High assurance data tagger for I/O feeds
|
FR2900008B1
(en)
*
|
2006-04-18 |
2008-05-30 |
Airbus France Sas |
METHOD AND DEVICE FOR COMMUNICATING ON A COMMUNICATION LINK BETWEEN AN AIRCRAFT AND A SOIL STATION
|
US8407763B2
(en)
*
|
2006-04-28 |
2013-03-26 |
Bae Systems Information And Electronic Systems Integration Inc. |
Secure network interface device
|
US7970013B2
(en)
|
2006-06-16 |
2011-06-28 |
Airdefense, Inc. |
Systems and methods for wireless network content filtering
|
US8000698B2
(en)
*
|
2006-06-26 |
2011-08-16 |
Microsoft Corporation |
Detection and management of rogue wireless network connections
|
US20080016547A1
(en)
*
|
2006-07-11 |
2008-01-17 |
International Business Machines Corporation |
System and method for security planning with hard security constraints
|
US7958368B2
(en)
*
|
2006-07-14 |
2011-06-07 |
Microsoft Corporation |
Password-authenticated groups
|
US7920705B1
(en)
*
|
2006-07-26 |
2011-04-05 |
Rockwell Collins, Inc. |
System and method for convert channel detection
|
US20080052539A1
(en)
*
|
2006-07-29 |
2008-02-28 |
Macmillan David M |
Inline storage protection and key devices
|
US8281392B2
(en)
|
2006-08-11 |
2012-10-02 |
Airdefense, Inc. |
Methods and systems for wired equivalent privacy and Wi-Fi protected access protection
|
US20080046879A1
(en)
*
|
2006-08-15 |
2008-02-21 |
Michael Hostetler |
Network device having selected functionality
|
US8335703B1
(en)
*
|
2006-10-20 |
2012-12-18 |
Desktone, Inc. |
Virtual computing services deployment network
|
US9141557B2
(en)
|
2006-12-08 |
2015-09-22 |
Ashish A. Pandya |
Dynamic random access memory (DRAM) that comprises a programmable intelligent search memory (PRISM) and a cryptography processing engine
|
US7996348B2
(en)
|
2006-12-08 |
2011-08-09 |
Pandya Ashish A |
100GBPS security and search architecture using programmable intelligent search memory (PRISM) that comprises one or more bit interval counters
|
US8887296B2
(en)
*
|
2006-12-12 |
2014-11-11 |
The Boeing Company |
Method and system for object-based multi-level security in a service oriented architecture
|
IL180020A
(en)
*
|
2006-12-12 |
2013-03-24 |
Waterfall Security Solutions Ltd |
Encryption -and decryption-enabled interfaces
|
FR2910657B1
(en)
*
|
2006-12-22 |
2012-11-16 |
Ingenico Sa |
METHOD OF VERIFYING THE CONFORMITY OF AN ELECTRONIC PLATFORM AND / OR A COMPUTER PROGRAM PRESENT ON THIS PLATFORM, DEVICE AND CORRESPONDING COMPUTER PROGRAM.
|
US7551073B2
(en)
*
|
2007-01-10 |
2009-06-23 |
International Business Machines Corporation |
Method, system and program product for alerting an information technology support organization of a security event
|
IL180748A
(en)
|
2007-01-16 |
2013-03-24 |
Waterfall Security Solutions Ltd |
Secure archive
|
US7822851B2
(en)
*
|
2007-01-18 |
2010-10-26 |
Internet Probation and Parole Control, Inc. |
Remote user computer control and monitoring
|
US7949716B2
(en)
|
2007-01-24 |
2011-05-24 |
Mcafee, Inc. |
Correlation and analysis of entity attributes
|
US8179798B2
(en)
|
2007-01-24 |
2012-05-15 |
Mcafee, Inc. |
Reputation based connection throttling
|
US8763114B2
(en)
|
2007-01-24 |
2014-06-24 |
Mcafee, Inc. |
Detecting image spam
|
US8214497B2
(en)
|
2007-01-24 |
2012-07-03 |
Mcafee, Inc. |
Multi-dimensional reputation scoring
|
US7779156B2
(en)
|
2007-01-24 |
2010-08-17 |
Mcafee, Inc. |
Reputation based load balancing
|
US8307411B2
(en)
*
|
2007-02-09 |
2012-11-06 |
Microsoft Corporation |
Generic framework for EAP
|
US7941837B1
(en)
*
|
2007-04-18 |
2011-05-10 |
Juniper Networks, Inc. |
Layer two firewall with active-active high availability support
|
PL1997737T3
(en)
*
|
2007-05-11 |
2010-11-30 |
Sca Hygiene Prod Ab |
Packaging and supply device for grouping products items
|
US8429406B2
(en)
*
|
2007-06-04 |
2013-04-23 |
Qualcomm Atheros, Inc. |
Authorizing customer premise equipment into a network
|
US8984620B2
(en)
*
|
2007-07-06 |
2015-03-17 |
Cyberoam Technologies Pvt. Ltd. |
Identity and policy-based network security and management system and method
|
US7840708B2
(en)
*
|
2007-08-13 |
2010-11-23 |
Cisco Technology, Inc. |
Method and system for the assignment of security group information using a proxy
|
US7996543B2
(en)
*
|
2007-08-16 |
2011-08-09 |
Xcastlabs |
Client-to-client direct RTP exchange in a managed client-server network
|
IL187492A0
(en)
*
|
2007-09-06 |
2008-02-09 |
Human Interface Security Ltd |
Information protection device
|
US8122497B2
(en)
*
|
2007-09-10 |
2012-02-21 |
Redcloud, Inc. |
Networked physical security access control system and method
|
US7954145B2
(en)
*
|
2007-09-27 |
2011-05-31 |
Novell, Inc. |
Dynamically configuring a client for virtual private network (VPN) access
|
JP5102916B2
(en)
*
|
2007-10-12 |
2012-12-19 |
株式会社日立製作所 |
Storage system and storage system management method
|
US8185930B2
(en)
|
2007-11-06 |
2012-05-22 |
Mcafee, Inc. |
Adjusting filter or classification control settings
|
US8045458B2
(en)
|
2007-11-08 |
2011-10-25 |
Mcafee, Inc. |
Prioritizing network traffic
|
US8160975B2
(en)
|
2008-01-25 |
2012-04-17 |
Mcafee, Inc. |
Granular support vector machine with random granularity
|
US7853548B2
(en)
*
|
2008-02-20 |
2010-12-14 |
International Business Machines Corporation |
Methodology and computer program product for effecting rule evaluation in policy based data management
|
US8429739B2
(en)
|
2008-03-31 |
2013-04-23 |
Amazon Technologies, Inc. |
Authorizing communications between computing nodes
|
US8589503B2
(en)
|
2008-04-04 |
2013-11-19 |
Mcafee, Inc. |
Prioritizing network traffic
|
US8135838B2
(en)
|
2008-04-08 |
2012-03-13 |
Geminare Incorporated |
System and method for providing data and application continuity in a computer system
|
US8752131B2
(en)
*
|
2008-04-30 |
2014-06-10 |
Fujitsu Limited |
Facilitating protection of a maintenance entity group
|
US20090282460A1
(en)
*
|
2008-05-12 |
2009-11-12 |
Raytheon Company |
System and Method for Transferring Information Through a Trusted Network
|
US8028030B2
(en)
*
|
2008-05-22 |
2011-09-27 |
International Business Machines Corporation |
Method and system for supervising electronic text communications of an enterprise
|
US8132004B2
(en)
*
|
2008-06-12 |
2012-03-06 |
The Boeing Company |
Multiple independent levels of security containing multi-level security interface
|
US8352729B2
(en)
*
|
2008-07-29 |
2013-01-08 |
International Business Machines Corporation |
Secure application routing
|
IL194943A0
(en)
*
|
2008-10-27 |
2009-09-22 |
Human Interface Security Ltd |
Verification of data transmitted by computer
|
US8479256B2
(en)
*
|
2008-11-26 |
2013-07-02 |
Red Hat, Inc. |
Merging mandatory access control (MAC) policies in a system with multiple execution containers
|
US9767273B2
(en)
*
|
2008-11-26 |
2017-09-19 |
Red Hat, Inc. |
Reliably terminating processes in a system with confined execution environments
|
US8312043B2
(en)
*
|
2008-11-26 |
2012-11-13 |
Red Hat, Inc. |
Isolating an execution container in a system with mandatory access control (MAC)
|
CA2747816C
(en)
*
|
2008-12-24 |
2015-03-24 |
Chalk Media Service Corp. |
A system, network and method for multi-platform publishing and synchronized content
|
EP2211523B1
(en)
*
|
2009-01-23 |
2016-05-04 |
Siemens Aktiengesellschaft |
Communication network and conversion module
|
US8458718B2
(en)
*
|
2009-08-27 |
2013-06-04 |
The Boeing Company |
Statically partitioning into fixed and independent systems with fixed processing core
|
US20110066851A1
(en)
|
2009-09-14 |
2011-03-17 |
International Business Machines Corporation |
Secure Route Discovery Node and Policing Mechanism
|
US8510334B2
(en)
|
2009-11-05 |
2013-08-13 |
Oracle International Corporation |
Lock manager on disk
|
US8127365B1
(en)
|
2009-11-16 |
2012-02-28 |
Trend Micro Incorporated |
Origination-based content protection for computer systems
|
US8424091B1
(en)
|
2010-01-12 |
2013-04-16 |
Trend Micro Incorporated |
Automatic local detection of computer security threats
|
US9485218B2
(en)
*
|
2010-03-23 |
2016-11-01 |
Adventium Enterprises, Llc |
Device for preventing, detecting and responding to security threats
|
US8621638B2
(en)
|
2010-05-14 |
2013-12-31 |
Mcafee, Inc. |
Systems and methods for classification of messaging entities
|
US8595840B1
(en)
|
2010-06-01 |
2013-11-26 |
Trend Micro Incorporated |
Detection of computer network data streams from a malware and its variants
|
US8462018B1
(en)
*
|
2011-05-26 |
2013-06-11 |
Rockwell Collins, Inc. |
Systems and method for controlling the simultaneous display of multi-level classified information on the same surface of an aircraft display unit
|
US8666919B2
(en)
|
2011-07-29 |
2014-03-04 |
Accenture Global Services Limited |
Data quality management for profiling, linking, cleansing and migrating data
|
CN102299926B
(en)
*
|
2011-08-29 |
2014-02-19 |
浙江中烟工业有限责任公司 |
Data exchange prepositioning subsystem of multistage safe interconnection platform
|
US8640251B1
(en)
|
2011-12-14 |
2014-01-28 |
Trend Micro Incorporated |
Methods and systems for classifying computer documents into confidential levels using log information
|
US8874790B2
(en)
|
2011-12-30 |
2014-10-28 |
Verisign, Inc. |
DNS package in a partitioned network
|
US8826452B1
(en)
|
2012-01-18 |
2014-09-02 |
Trend Micro Incorporated |
Protecting computers against data loss involving screen captures
|
WO2013138979A1
(en)
*
|
2012-03-19 |
2013-09-26 |
Empire Technology Development Llc |
Hybrid multi-tenancy cloud platform
|
US9064210B1
(en)
*
|
2012-03-31 |
2015-06-23 |
Emc Corporation |
Semantically-aware behavioral security analysis system for security information and event management
|
US8539548B1
(en)
|
2012-04-27 |
2013-09-17 |
International Business Machines Corporation |
Tiered network policy configuration with policy customization control
|
US8875307B2
(en)
*
|
2012-05-03 |
2014-10-28 |
Sap Ag |
Managing network identities
|
US9397978B1
(en)
|
2012-12-21 |
2016-07-19 |
Western Digital Technologies, Inc. |
Cloud to local router security
|
US9326144B2
(en)
|
2013-02-21 |
2016-04-26 |
Fortinet, Inc. |
Restricting broadcast and multicast traffic in a wireless network to a VLAN
|
US9317718B1
(en)
|
2013-03-29 |
2016-04-19 |
Secturion Systems, Inc. |
Security device with programmable systolic-matrix cryptographic module and programmable input/output interface
|
US9374344B1
(en)
|
2013-03-29 |
2016-06-21 |
Secturion Systems, Inc. |
Secure end-to-end communication system
|
US9355279B1
(en)
|
2013-03-29 |
2016-05-31 |
Secturion Systems, Inc. |
Multi-tenancy architecture
|
US9798899B1
(en)
|
2013-03-29 |
2017-10-24 |
Secturion Systems, Inc. |
Replaceable or removable physical interface input/output module
|
US9524399B1
(en)
*
|
2013-04-01 |
2016-12-20 |
Secturion Systems, Inc. |
Multi-level independent security architecture
|
AU2013387709C1
(en)
*
|
2013-04-25 |
2018-05-31 |
Saab Ab |
Method and arrangement for protecting a trusted network
|
US10326734B2
(en)
|
2013-07-15 |
2019-06-18 |
University Of Florida Research Foundation, Incorporated |
Adaptive identity rights management system for regulatory compliance and privacy protection
|
US20160308838A1
(en)
*
|
2013-12-20 |
2016-10-20 |
Hewlett Packard Enterprise Development Lp |
Digital switchboard
|
US9998426B2
(en)
|
2014-01-30 |
2018-06-12 |
Sierra Nevada Corporation |
Bi-directional data security for control systems
|
US9531669B2
(en)
|
2014-01-30 |
2016-12-27 |
Sierra Nevada Corporation |
Bi-directional data security for supervisor control and data acquisition networks
|
US10680816B2
(en)
*
|
2014-03-26 |
2020-06-09 |
Continental Teves Ag & Co. Ohg |
Method and system for improving the data security during a communication process
|
IL235175A
(en)
|
2014-10-19 |
2017-08-31 |
Frenkel Lior |
Secure remote desktop
|
US9584587B2
(en)
|
2015-02-03 |
2017-02-28 |
Fortinet, Inc. |
Managing transmission and storage of sensitive data
|
US9794064B2
(en)
|
2015-09-17 |
2017-10-17 |
Secturion Systems, Inc. |
Client(s) to cloud or remote server secure data or file object encryption gateway
|
US11283774B2
(en)
|
2015-09-17 |
2022-03-22 |
Secturion Systems, Inc. |
Cloud storage using encryption gateway with certificate authority identification
|
US10708236B2
(en)
|
2015-10-26 |
2020-07-07 |
Secturion Systems, Inc. |
Multi-independent level secure (MILS) storage encryption
|
IL250010B
(en)
|
2016-02-14 |
2020-04-30 |
Waterfall Security Solutions Ltd |
Secure connection with protected facilities
|
CN105760763A
(en)
*
|
2016-02-18 |
2016-07-13 |
公安部第研究所 |
Grade protection check system based on check knowledge base technology and application method of grade protection check system
|
US11265249B2
(en)
|
2016-04-22 |
2022-03-01 |
Blue Armor Technologies, LLC |
Method for using authenticated requests to select network routes
|
US10187299B2
(en)
*
|
2016-04-22 |
2019-01-22 |
Blackridge Technology Holdings, Inc. |
Method for using authenticated requests to select network routes
|
US10757111B1
(en)
*
|
2016-09-08 |
2020-08-25 |
Rockwell Collins, Inc. |
Information flow enforcement for multilevel secure systems
|
US20180083985A1
(en)
*
|
2016-09-20 |
2018-03-22 |
ShieldX Networks, Inc. |
Systems and methods for network security event filtering and translation
|
US10320748B2
(en)
|
2017-02-23 |
2019-06-11 |
At&T Intellectual Property I, L.P. |
Single packet authorization in a cloud computing environment
|
US10250778B2
(en)
*
|
2017-07-18 |
2019-04-02 |
Xerox Corporation |
Distributed smart card reader for multifunction printer
|
US10631168B2
(en)
*
|
2018-03-28 |
2020-04-21 |
International Business Machines Corporation |
Advanced persistent threat (APT) detection in a mobile device
|
CN110233825B
(en)
*
|
2019-05-07 |
2021-10-15 |
浙江大华技术股份有限公司 |
Equipment initial method, Internet of things equipment, system, platform equipment and intelligent equipment
|
WO2021023164A1
(en)
|
2019-08-02 |
2021-02-11 |
云丁网络技术(北京)有限公司 |
Intelligent lock control method and system
|
US11122054B2
(en)
|
2019-08-27 |
2021-09-14 |
Bank Of America Corporation |
Security tool
|
CN111181955B
(en)
*
|
2019-12-26 |
2022-02-08 |
北京卓讯科信技术有限公司 |
Session control method, device and storage medium based on mark
|
US11277410B2
(en)
*
|
2020-03-31 |
2022-03-15 |
Atlassian Pty Ltd. |
Systems and methods for integrating systems over untrusted networks
|
US11240229B2
(en)
|
2020-03-31 |
2022-02-01 |
Atlassian Pty Ltd. |
Systems and methods for integrating systems over untrusted networks
|
US11159515B2
(en)
|
2020-03-31 |
2021-10-26 |
Atlassian Pty Ltd. |
Systems and methods for integrating systems over untrusted networks
|
US11968187B2
(en)
|
2020-10-23 |
2024-04-23 |
Secturion Systems, Inc. |
Multi-independent level security for high performance computing and data storage systems
|