| 10783039 |
Intelligent backup and restore system |
— |
2020-09-22 |
| 10614225 |
System and method for tracing data access and detecting abnormality in the same |
— |
2020-04-07 |
| 10484181 |
Streaming non-repudiation for data access and data transaction |
— |
2019-11-19 |
| 10068094 |
System and method for tracing data access and detecting abnormality in the same |
— |
2018-09-04 |
| 9807125 |
System and method for tracking and auditing data access in a network environment |
— |
2017-10-31 |
| 9792180 |
Intelligent backup and restore system |
— |
2017-10-17 |
| 9742641 |
System and method for identifying real users behind application servers |
— |
2017-08-22 |
| 9462014 |
System and method for tracking and auditing data access in a network environment |
— |
2016-10-04 |
| 9189634 |
System and method for information risk management |
— |
2015-11-17 |
| 9049224 |
System and method for detecting behavior anomaly in information access |
— |
2015-06-02 |
| 8635332 |
System and method for identifying real users behind application servers |
— |
2014-01-21 |
| 8631081 |
System and method for information risk management |
— |
2014-01-14 |
| 8606913 |
Method for adaptively building a baseline behavior model |
— |
2013-12-10 |
| 8572736 |
System and method for detecting behavior anomaly in information access |
— |
2013-10-29 |
| 8326987 |
Method for adaptively building a baseline behavior model |
— |
2012-12-04 |
| 7882558 |
Tunnel designation system for virtual private networks |
— |
2011-02-01 |
| 7773604 |
System directing flow of packets by-passing policy-based application for processing by policy engine according to action specification in policy cache |
— |
2010-08-10 |
| 7420976 |
System directing flow of packets by-passing policy-based application for processing by policy engine according to action specification in policy cache |
— |
2008-09-02 |
| 7117530 |
Tunnel designation system for virtual private networks |
— |
2006-10-03 |
| 7006502 |
System using stream specification and action specification stored in policy cache to process the flow of data packets by appropriate action processor |
— |
2006-02-28 |
| 6751668 |
Denial-of-service attack blocking with selective passing and flexible monitoring |
Chung-Wen Soung |
2004-06-15 |