|
US5932285A
(en)
*
|
1995-02-17 |
1999-08-03 |
Medlogic Global Corporation |
Encapsulated materials
|
|
US10511573B2
(en)
*
|
1998-10-30 |
2019-12-17 |
Virnetx, Inc. |
Agile network protocol for secure communications using secure domain names
|
|
US20040073617A1
(en)
|
2000-06-19 |
2004-04-15 |
Milliken Walter Clark |
Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
|
|
US7111163B1
(en)
|
2000-07-10 |
2006-09-19 |
Alterwan, Inc. |
Wide area network using internet with quality of service
|
|
US6801503B1
(en)
*
|
2000-10-09 |
2004-10-05 |
Arbor Networks, Inc. |
Progressive and distributed regulation of selected network traffic destined for a network node
|
|
WO2002071227A1
(en)
*
|
2001-03-01 |
2002-09-12 |
Cyber Operations, Llc |
System and method for anti-network terrorism
|
|
US7342929B2
(en)
*
|
2001-04-27 |
2008-03-11 |
Cisco Technology, Inc. |
Weighted fair queuing-based methods and apparatus for protecting against overload conditions on nodes of a distributed network
|
|
AU2002322109A1
(en)
*
|
2001-06-13 |
2002-12-23 |
Intruvert Networks, Inc. |
Method and apparatus for distributed network security
|
|
US7684317B2
(en)
*
|
2001-06-14 |
2010-03-23 |
Nortel Networks Limited |
Protecting a network from unauthorized access
|
|
DE10147889A1
(en)
*
|
2001-09-28 |
2003-04-30 |
Siemens Ag |
Proxy unit, method for computer-aided protection of an application server program and arrangement with a proxy unit and a unit for executing an application server program
|
|
JP3726741B2
(en)
*
|
2001-11-16 |
2005-12-14 |
日本電気株式会社 |
Packet transfer apparatus, method and program
|
|
NZ516346A
(en)
*
|
2001-12-21 |
2004-09-24 |
Esphion Ltd |
A device for evaluating traffic on a computer network to detect traffic abnormalities such as a denial of service attack
|
|
US7127512B2
(en)
*
|
2002-02-19 |
2006-10-24 |
Qualcomm Inc. |
Method and apparatus for two-phase commit in data distribution to a web farm
|
|
US7388866B2
(en)
*
|
2002-03-07 |
2008-06-17 |
Broadcom Corporation |
System and method for expediting upper layer protocol (ULP) connection negotiations
|
|
US7680043B2
(en)
*
|
2002-03-20 |
2010-03-16 |
International Business Machines Corporation |
Network processor having fast flow queue disable process
|
|
CA2486695A1
(en)
*
|
2002-05-22 |
2003-12-04 |
Lucid Security Corporation |
Adaptive intrusion detection system
|
|
EP1369766B1
(en)
*
|
2002-06-07 |
2008-01-02 |
Hewlett-Packard Development Company, L.P. |
Propogation of viruses through an information technology network
|
|
GB2394382A
(en)
|
2002-10-19 |
2004-04-21 |
Hewlett Packard Co |
Monitoring the propagation of viruses through an Information Technology network
|
|
GB2391419A
(en)
|
2002-06-07 |
2004-02-04 |
Hewlett Packard Co |
Restricting the propagation of a virus within a network
|
|
US7139679B1
(en)
*
|
2002-06-27 |
2006-11-21 |
Cisco Technology, Inc. |
Method and apparatus for cryptographic protection from denial of service attacks
|
|
US7420929B1
(en)
|
2002-07-02 |
2008-09-02 |
Juniper Networks, Inc. |
Adaptive network flow analysis
|
|
CA2393373A1
(en)
|
2002-07-15 |
2004-01-15 |
Anthony Gerkis |
Apparatus, system and method for the transmission of data with different qos attributes.
|
|
US8351341B1
(en)
*
|
2002-08-02 |
2013-01-08 |
Juniper Networks, Inc. |
Filtering to protect class of service
|
|
US7251215B1
(en)
|
2002-08-26 |
2007-07-31 |
Juniper Networks, Inc. |
Adaptive network router
|
|
US20100138909A1
(en)
*
|
2002-09-06 |
2010-06-03 |
O2Micro, Inc. |
Vpn and firewall integrated system
|
|
US7467408B1
(en)
*
|
2002-09-09 |
2008-12-16 |
Cisco Technology, Inc. |
Method and apparatus for capturing and filtering datagrams for network security monitoring
|
|
KR100481614B1
(en)
*
|
2002-11-19 |
2005-04-08 |
한국전자통신연구원 |
METHOD AND APPARATUS FOR PROTECTING LEGITIMATE TRAFFIC FROM DoS AND DDoS ATTACKS
|
|
US7397827B2
(en)
*
|
2002-12-11 |
2008-07-08 |
Tellabs Operations, Inc. |
Systems and methods for switching multi-rate communications
|
|
JP3961415B2
(en)
*
|
2002-12-16 |
2007-08-22 |
株式会社エヌ・ティ・ティ・ドコモ |
Protocol defect automatic detection method and protocol defect automatic detection device
|
|
US7796515B2
(en)
|
2003-04-29 |
2010-09-14 |
Hewlett-Packard Development Company, L.P. |
Propagation of viruses through an information technology network
|
|
US7278156B2
(en)
*
|
2003-06-04 |
2007-10-02 |
International Business Machines Corporation |
System and method for enforcing security service level agreements
|
|
NO320962B1
(en)
*
|
2003-07-04 |
2006-02-20 |
Telenor Asa |
Use of polarization to distinguish different types of information
|
|
US9032095B1
(en)
|
2004-01-06 |
2015-05-12 |
Juniper Networks, Inc. |
Routing device having multiple logical routers
|
|
US7343530B2
(en)
*
|
2004-02-10 |
2008-03-11 |
Samsung Electronics Co., Ltd. |
Turbo decoder and turbo interleaver
|
|
GB2431316B
(en)
*
|
2005-10-12 |
2008-05-21 |
Hewlett Packard Development Co |
Propagation of malicious code through an information technology network
|
|
US7546635B1
(en)
|
2004-08-11 |
2009-06-09 |
Juniper Networks, Inc. |
Stateful firewall protection for control plane traffic within a network device
|
|
US7725708B2
(en)
*
|
2004-10-07 |
2010-05-25 |
Genband Inc. |
Methods and systems for automatic denial of service protection in an IP device
|
|
US7626940B2
(en)
*
|
2004-12-22 |
2009-12-01 |
Intruguard Devices, Inc. |
System and method for integrated header, state, rate and content anomaly prevention for domain name service
|
|
US7602731B2
(en)
*
|
2004-12-22 |
2009-10-13 |
Intruguard Devices, Inc. |
System and method for integrated header, state, rate and content anomaly prevention with policy enforcement
|
|
US7610610B2
(en)
|
2005-01-10 |
2009-10-27 |
Mcafee, Inc. |
Integrated firewall, IPS, and virus scanner system and method
|
|
US10225282B2
(en)
*
|
2005-04-14 |
2019-03-05 |
International Business Machines Corporation |
System, method and program product to identify a distributed denial of service attack
|
|
US8631483B2
(en)
*
|
2005-06-14 |
2014-01-14 |
Texas Instruments Incorporated |
Packet processors and packet filter processes, circuits, devices, and systems
|
|
GB2428421A
(en)
*
|
2005-07-20 |
2007-01-31 |
Robert James Frost |
Kerbstone lifting device
|
|
TWI276334B
(en)
*
|
2005-09-16 |
2007-03-11 |
Ind Tech Res Inst |
Methods for allocating transmission bandwidths of a network
|
|
DE102005046935B4
(en)
*
|
2005-09-30 |
2009-07-23 |
Nokia Siemens Networks Gmbh & Co.Kg |
Network access node computer to a communication network, communication system and method for assigning a protection device
|
|
US7797738B1
(en)
*
|
2005-12-14 |
2010-09-14 |
At&T Corp. |
System and method for avoiding and mitigating a DDoS attack
|
|
US7860990B2
(en)
*
|
2006-01-31 |
2010-12-28 |
Genband Us Llc |
Session data records and related alarming within a session over internet protocol (SOIP) network
|
|
US7861003B2
(en)
*
|
2006-01-31 |
2010-12-28 |
Genband Us Llc |
Adaptive feedback for session over internet protocol
|
|
US7610622B2
(en)
*
|
2006-02-06 |
2009-10-27 |
Cisco Technology, Inc. |
Supporting options in a communication session using a TCP cookie
|
|
US20070183416A1
(en)
*
|
2006-02-07 |
2007-08-09 |
Mark Gooch |
Per-port penalty queue system for re-prioritization of network traffic sent to a processor
|
|
US7633944B1
(en)
|
2006-05-12 |
2009-12-15 |
Juniper Networks, Inc. |
Managing timeouts for dynamic flow capture and monitoring of packet flows
|
|
US7747737B1
(en)
|
2006-05-12 |
2010-06-29 |
Juniper Networks, Inc. |
Network device having service card for dynamic flow capture and monitoring of packet flows
|
|
US8001601B2
(en)
*
|
2006-06-02 |
2011-08-16 |
At&T Intellectual Property Ii, L.P. |
Method and apparatus for large-scale automated distributed denial of service attack detection
|
|
EP1868321B1
(en)
*
|
2006-06-12 |
2016-01-20 |
Mitsubishi Denki Kabushiki Kaisha |
In-line content analysis of a TCP segment stream
|
|
US8259688B2
(en)
|
2006-09-01 |
2012-09-04 |
Wi-Lan Inc. |
Pre-allocated random access identifiers
|
|
EP1898586A1
(en)
*
|
2006-09-07 |
2008-03-12 |
Mitsubishi Electric Information Technology Center Europe B.V. |
Protection for data transmission network systems against SYN flood denial of service attacks
|
|
US7940657B2
(en)
*
|
2006-12-01 |
2011-05-10 |
Sonus Networks, Inc. |
Identifying attackers on a network
|
|
US7672336B2
(en)
*
|
2006-12-01 |
2010-03-02 |
Sonus Networks, Inc. |
Filtering and policing for defending against denial of service attacks on a network
|
|
US7804774B2
(en)
*
|
2006-12-01 |
2010-09-28 |
Sonus Networks, Inc. |
Scalable filtering and policing mechanism for protecting user traffic in a network
|
|
US7742409B2
(en)
*
|
2007-08-15 |
2010-06-22 |
At&T Intellectual Property Ii, L.P. |
Method and apparatus for compensating for performance degradation of an application session
|
|
US7912062B2
(en)
*
|
2007-09-28 |
2011-03-22 |
Genband Us Llc |
Methods and apparatus for managing addresses related to virtual partitions of a session exchange device
|
|
JP4576568B2
(en)
*
|
2007-12-03 |
2010-11-10 |
Necカシオモバイルコミュニケーションズ株式会社 |
Hinge structure and folding electronic device
|
|
US8339959B1
(en)
|
2008-05-20 |
2012-12-25 |
Juniper Networks, Inc. |
Streamlined packet forwarding using dynamic filters for routing and security in a shared forwarding plane
|
|
US8375453B2
(en)
*
|
2008-05-21 |
2013-02-12 |
At&T Intellectual Property I, Lp |
Methods and apparatus to mitigate a denial-of-service attack in a voice over internet protocol network
|
|
US8413250B1
(en)
|
2008-06-05 |
2013-04-02 |
A9.Com, Inc. |
Systems and methods of classifying sessions
|
|
JP5473406B2
(en)
*
|
2008-07-18 |
2014-04-16 |
キヤノン株式会社 |
Network processing apparatus and processing method thereof
|
|
US8955107B2
(en)
*
|
2008-09-12 |
2015-02-10 |
Juniper Networks, Inc. |
Hierarchical application of security services within a computer network
|
|
US8040808B1
(en)
|
2008-10-20 |
2011-10-18 |
Juniper Networks, Inc. |
Service aware path selection with a network acceleration device
|
|
US8363836B2
(en)
*
|
2009-01-16 |
2013-01-29 |
Cisco Technology, Inc. |
Using authentication tokens to authorize a firewall to open a pinhole
|
|
US8751627B2
(en)
|
2009-05-05 |
2014-06-10 |
Accenture Global Services Limited |
Method and system for application migration in a cloud
|
|
US20110038259A1
(en)
*
|
2009-07-31 |
2011-02-17 |
Sonus Networks, Inc. |
Priority Policing of Requests with Deferred Determination of Priority Level
|
|
CN102035821A
(en)
*
|
2009-09-29 |
2011-04-27 |
凹凸电子(武汉)有限公司 |
Firewall / virtual private network integrated system and circuit
|
|
US20110083175A1
(en)
*
|
2009-10-06 |
2011-04-07 |
Sonus Networks, Inc. |
Methods and Apparatuses for Policing and Prioritizing of Data Services
|
|
US8369345B1
(en)
|
2009-11-13 |
2013-02-05 |
Juniper Networks, Inc. |
Multi-router system having shared network interfaces
|
|
US8707428B2
(en)
|
2010-08-05 |
2014-04-22 |
At&T Intellectual Property I, L.P. |
Apparatus and method for defending against internet-based attacks
|
|
US9253062B2
(en)
*
|
2011-12-23 |
2016-02-02 |
Ixia |
Byte by byte received data integrity check
|
|
US9251535B1
(en)
|
2012-01-05 |
2016-02-02 |
Juniper Networks, Inc. |
Offload of data transfer statistics from a mobile access gateway
|
|
JP6105163B2
(en)
*
|
2013-06-27 |
2017-03-29 |
徐 正 煥SEO, Jeong Hoan |
Multiple connection system and method for service using Internet protocol
|
|
US10762208B2
(en)
*
|
2015-06-26 |
2020-09-01 |
Intel Corporation |
System and method for regaining operational control of compromised remote servers
|
|
US9973528B2
(en)
|
2015-12-21 |
2018-05-15 |
Fortinet, Inc. |
Two-stage hash based logic for application layer distributed denial of service (DDoS) attack attribution
|
|
US10341864B2
(en)
|
2017-03-03 |
2019-07-02 |
Verizon Patent And Licensing Inc. |
Network-based device registration for content distribution platforms
|
|
US11424993B1
(en)
|
2017-05-30 |
2022-08-23 |
Amazon Technologies, Inc. |
Artificial intelligence system for network traffic flow based detection of service usage policy violations
|
|
US10404747B1
(en)
*
|
2018-07-24 |
2019-09-03 |
Illusive Networks Ltd. |
Detecting malicious activity by using endemic network hosts as decoys
|
|
US11343273B2
(en)
|
2020-03-20 |
2022-05-24 |
Amrita Vishwa Vidyapeetham |
Method of reducing DoS attacks using voice response in IoT systems
|