| 8914885 |
Methods and apparatus for delivering control messages during a malicious attack in one or more packet networks |
Michael B. Greenwald |
2014-12-16 |
| 8776217 |
Methods and apparatus for detecting unwanted traffic in one or more packet networks utilizing string analysis |
Clifford Martin |
2014-07-08 |
| 8776237 |
Method and apparatus for end-to-end security in a heterogeneous network |
— |
2014-07-08 |
| 8355324 |
Method and apparatus for filtering data packets |
Yuliy Baryshnikov, Dan Romik, Francis X. Zane |
2013-01-15 |
| 8112790 |
Methods and apparatus for authenticating a remote service to another service on behalf of a user |
Victor C Zandy |
2012-02-07 |
| 7929703 |
Methods and system for managing security keys within a wireless network |
Douglas H. Bellows, Alexandro Salvarani, Mark H. Kraml |
2011-04-19 |
| 7889735 |
Method and apparatus for defending against denial of service attacks in IP networks based on specified source/destination IP address pairs |
— |
2011-02-15 |
| 7565405 |
Method and apparatus for providing data storage in peer-to-peer networks |
David Presotto |
2009-07-21 |
| 7477902 |
Capacity allocation in a wireless communication system |
Andrew C. Clark, Mark H. Kraml |
2009-01-13 |
| 7047408 |
Secure mutual network authentication and key exchange protocol |
Victor Boyko, Philip Mackenzie, Sarvar Patel |
2006-05-16 |
| 6205551 |
Computer security using virus probing |
— |
2001-03-20 |
| 5734886 |
Database dependency resolution method and system for identifying related data files |
David Presotto |
1998-03-31 |
| 5696898 |
System and method for database access control |
Brenda Sue Baker |
1997-12-09 |
| 5678041 |
System and method for restricting user access rights on the internet based on rating information stored in a relational database |
Brenda Sue Baker |
1997-10-14 |