| 9514459 |
Identity broker tools and techniques for use with forward proxy computers |
Kshitij A. Doshi, Carolyn B. McClain |
2016-12-06 |
| 8850017 |
Brokering state information and identity among user agents, origin servers, and proxies |
Robert Drew Major |
2014-09-30 |
| 8065720 |
Techniques for managing secure communications |
Stephen R. Carter, Mel J. Oyler |
2011-11-22 |
| 8060926 |
Techniques for securely managing and accelerating data delivery |
Mark D. Ackerman, Mel J. Oyler |
2011-11-15 |
| 7954144 |
Brokering state information and identity among user agents, origin servers, and proxies |
Robert Drew Major |
2011-05-31 |
| 7904951 |
Techniques for securely accelerating external domains locally |
Baber Amin, Mark D. Ackerman |
2011-03-08 |
| 7793342 |
Single sign-on with basic authentication for a transparent proxy |
Bradley Rupp, Mel J. Oyler |
2010-09-07 |
| 7681229 |
Proxy authentication |
Mark D. Ackerman, Carolyn B. McClain |
2010-03-16 |
| 7502922 |
Computer network having a security layer interface independent of the application transport mechanism |
Baber Amin |
2009-03-10 |
| 7376134 |
Privileged network routing |
Stephen R. Carter, Lloyd Leon Burch, Carolyn B. McClain |
2008-05-20 |
| 7353537 |
Secure transparent virtual private networks |
Mark D. Ackerman, Baber Amin |
2008-04-01 |
| 7334257 |
Techniques for preserving content during a redirection for authentication |
Baber Amin, Stephen R. Carter, Scott W. Pathakis, Robert Skousen Stilmar |
2008-02-19 |
| 6950936 |
Secure intranet access |
Anand Subramaniam |
2005-09-27 |
| 6640302 |
Secure intranet access |
Anand Subramaniam |
2003-10-28 |
| 6081900 |
Secure intranet access |
Anand Subramaniam |
2000-06-27 |