СПИСОК патентов США - подгруппа МПК16 H04L12/22
|
№ п/п | Номер патента | Название патента | |||
2017 | |||||
1 | 9602481 | Generation of short key for communications | |||
2 | 9594895 | Information processing system and authentication information providing method for providing authentication information of an external service | |||
3 | 9559820 | Feedback reporting based on channel state information reference signal (CSI-RS) groups | |||
4 | 9548935 | Systems and methods for providing content and services on a network system | |||
5 | 9537910 | Communication and action approval system and method | |||
6 | 9537828 | Secure mobile communication relay having firewall function | |||
2016 | |||||
7 | 9516048 | Contagion isolation and inoculation via quarantine | |||
8 | 9512659 | Code hopping based system with increased security | |||
9 | 9478112 | Video monitoring and alarm verification technology | |||
10 | 9455955 | Customizable storage controller with integrated F+ storage firewall protection | |||
11 | 9414225 | User equipment having web real time communication architecture | |||
12 | 9386004 | Peer based authentication | |||
13 | 9374278 | Graphic user interface based network management system to define and execute troubleshooting procedure | |||
14 | 9276904 | Specifying point of enforcement in a firewall rule | |||
15 | 9264402 | Systems involving firewall of virtual machine traffic and methods of processing information associated with same | |||
16 | 9240935 | Communication system | |||
17 | 9237139 | Controlling access to a secure resource based on user credentials and location | |||
2015 | |||||
18 | 9143531 | Method and apparatus for a master privacy policy mechanism in a communications network | |||
19 | 9124581 | Industrial automation system and method for safeguarding the system | |||
20 | 9124502 | Method and apparatus of determining blocking in ring network | |||
21 | 9104488 | Support server for redirecting task results to a wake-up server | |||
22 | 9083683 | Encryption/decryption device for secure communications between a protected network and an unprotected network and associated methods | |||
23 | 9064394 | Virtual sensors | |||
24 | 9049023 | Outsourcing the decryption of functional encryption ciphertexts | |||
25 | 8973151 | Portable security device and methods for secure communication | |||
26 | 8972736 | Fully authenticated content transmission from a provider to a recipient device via an intermediary device | |||
27 | 8948001 | Service plane triggered fast reroute protection | |||
28 | 8938784 | Authorization of server operations | |||
29 | 8937661 | Video monitoring and alarm verification technology | |||
30 | 8935777 | Login using QR code | |||
2014 | |||||
31 | 8918632 | Methods for analyzing application privacy and devices thereof | |||
32 | 8893252 | Wireless communication selective barrier | |||
33 | 8863284 | System and method for determining a security status of potentially malicious files | |||
34 | 8844057 | Analyte data retriever | |||
35 | 8813236 | Detecting malicious endpoints using network connectivity and flow information | |||
36 | 8810657 | Video monitoring and alarm verification technology | |||
37 | 8793489 | Method and system for controlling data access to organizational data maintained in hierarchical | |||
38 | 8776242 | Providing a malware analysis using a secure malware detection process | |||
39 | 8752200 | Devices, systems and methods for security using magnetic field based identification | |||
40 | 8745722 | Managing remote network addresses in communications | |||
41 | 8745387 | Security management for an integrated console for applications associated with multiple user registries | |||
42 | 8689350 | Behavioral fingerprint controlled theft detection and recovery | |||
43 | 8683200 | Method and apparatus for implementing digital rights management | |||
44 | 8675071 | Video monitoring and alarm verification technology | |||
45 | 8667276 | Method and apparatus for article authentication | |||
46 | 8656482 | Secure communication using a trusted virtual machine | |||
47 | 8646030 | Method and apparatus for master privacy policy mechanism in a communications network | |||
48 | 8640255 | Authorization of server operations | |||
49 | 8640229 | Token-based security for links to media streams | |||
50 | 8630413 | Digital contents reproducing terminal and method for supporting digital contents transmission/reception between terminals according to personal use scope | |||
2013 | |||||
51 | 8615809 | System and method for website authentication using a shared secret | |||
52 | 8613089 | Identifying a denial-of-service attack in a cloud-based proxy service | |||
53 | 8578468 | Multi-factor client authentication | |||
54 | 8572366 | Authenticating clients | |||
55 | 8526614 | Method to manage members of at least one group of decoders having access to broadcast data | |||
56 | 8520072 | Video monitoring and alarm verification technology | |||
57 | 8458461 | Methods and apparatus for performing authentication and decryption | |||
58 | 8442232 | Deleting confidential information used to secure a communication link | |||
59 | 8429719 | Interworking between first and second authentication domains | |||
60 | 8418242 | Method, system, and device for negotiating SA on IPv6 network | |||
61 | 8411861 | Apparatus, systems, and methods for checking if a receiver is on a revocation list based on SRMs of DVDs | |||
62 | 8381282 | Portable security device and methods for maintenance of authentication information | |||
63 | 8353022 | Bilateral communication using multiple one-way data links | |||
64 | 8345872 | Digital local network, notably digital home network, and method for creating and updating such a network | |||
2012 | |||||
65 | 8336111 | Communication device and method for securing data | |||
66 | 8266422 | Network security processing method and system for selecting one of software and hardware cryptographic modules by means of multimedia session information | |||
67 | 8165020 | Network interface system with filtering function | |||
68 | 8130964 | Systems and methods for identity-based encryption and related cryptographic techniques | |||
2011 | |||||
69 | 8068414 | Arrangement for tracking IP address usage based on authenticated link identifier | |||
70 | 8065723 | Network communication device | |||
2010 | |||||
71 | 7852756 | Network interface system with filtering function | |||
72 | 7848286 | Wireless local area network (WLAN) and channel selection method of WLAN station | |||
73 | 7814531 | Detection of network environment for network access control | |||
74 | 7797754 | Dynamic control of authorization to access internet services | |||
75 | 7739747 | Dynamic control of authorization to access internet services | |||
76 | 7739738 | Enabling clean file cache persistence using dual-boot detection | |||
77 | 7725947 | Methods and systems for providing benchmark information under controlled access | |||
78 | 7649995 | Method and device for authenticating MS that has an R-UIM by using CAVE algorithm | |||
79 | 7647622 | Dynamic security policy through use of empirical security events | |||
2009 | |||||
80 | 7617400 | Storage partitioning | |||
81 | 7567510 | Security groups | |||
82 | 7565686 | Preventing unauthorized loading of late binding code into a process | |||
83 | 7555773 | Methods and apparatus to provide a platform-level network security framework | |||
2008 | |||||
84 | 7457278 | Terminal connection device, connection control device, and multi-function telephone terminal | |||
85 | 7451486 | Stateful and cross-protocol intrusion detection for voice over IP | |||
86 | 7437556 | Global visibility controls for operating system partitions | |||
87 | 7411981 | Matching of radius request and response packets during high traffic volume | |||
88 | 7370365 | Dynamic control of authorization to access internet services | |||
89 | 7367045 | Trusted communications system | |||
90 | 7353385 | Authentication system, authentication method, authentication apparatus, and authentication method therefor | |||
91 | 7349340 | System and method of monitoring e-service Quality of Service at a transaction level | |||
2007 | |||||
92 | 7313092 | Apparatus and method for an overload control procedure against denial of service attack | |||
93 | 7302567 | Technical facility having software stored on a computer of the technical facility | |||
94 | 7266118 | Packet receiving apparatus and packet transmission method | |||
95 | 7243235 | Mandatory access control (MAC) method | |||
96 | 7236460 | Detecting a counterfeit access point in a wireless local area network | |||
97 | 7228412 | Bufferless secure sockets layer architecture | |||
98 | 7227840 | High performance probabilistic rate policer | |||
99 | 7218613 | Method and apparatus for in context mediating common channel signaling messages between networks | |||
100 | 7174461 | Information providing system, apparatus and method, and program storing medium | |||
101 | 7158521 | Synchronization system and synchronization method of multisystem control apparatus | |||
2006 | |||||
102 | 7139644 | Process and system for transmitting information on an aircraft | |||
103 | 7123604 | Mobile IP communication scheme incorporating individual user authentication | |||
104 | 7085235 | Method and apparatus for constructing and searching IP address | |||
105 | 7069451 | Systems and methods for secure transaction management and electronic rights protection | |||
106 | 7062781 | Method for providing simultaneous parallel secure command execution on multiple remote hosts | |||
2005 | |||||
107 | 6901051 | Server-based network performance metrics generation system and method | |||
2004 | |||||
108 | 6678828 | Secure network file access control system | |||
2003 | |||||
109 | 6539482 | Network access authentication system | |||
110 | 6532406 | Vehicle computer system | |||
2002 | |||||
111 | 6487657 | Data communication network | |||
112 | 6484258 | Access control using attributes contained within public key certificates | |||
113 | 6385729 | Secure token device access to services provided by an internet service provider (ISP) | |||
2001 | |||||
114 | 6297729 | Method and apparatus for securing communications along ac power lines | |||
115 | 6272640 | Method and apparatus employing an invalid symbol security jam for communications network security | |||
116 | 6199165 | Method and apparatus for secure data communication | |||
2000 | |||||
117 | 6055634 | Secure internal communication system | |||
118 | 6014569 | Mobile interactive radio | |||
1999 | |||||
119 | 6006330 | Security device for ring network | |||
120 | 5961646 | Method and apparatus employing an invalid symbol security jam for communications network security | |||
121 | 5870479 | Device for processing data packets | |||
122 | 5867776 | Receiver for receiving text-based multiplex broadcasts | |||
1998 | |||||
123 | 5822433 | Method, system and subscriber facility for manipulation-proof separation of message streams | |||
124 | 5757922 | Method and system for packet scrambling communication with reduced processing overhead | |||
125 | 5754525 | Programmable delay of disrupt for secure networks | |||
1997 | |||||
126 | 5699426 | Video data bus communication system and method | |||
127 | 5661807 | Authentication system using one-time passwords | |||
128 | 5654985 | Address tracking over repeater based networks | |||
129 | 5640393 | Multiple address security architecture | |||
130 | 5602916 | Method and apparatus for preventing unauthorized monitoring of wireless data transmissions | |||
131 | 5592553 | Authentication system using one-time passwords | |||
1996 | |||||
132 | 5581559 | Inverse packet disrupt for secure networks | |||
133 | 5559883 | Method and apparatus for secure data packet bus communication | |||
134 | 5548646 | System for signatureless transmission and reception of data packets between computer networks | |||
135 | 5539737 | Programmable disrupt of multicast packets for secure networks | |||
136 | 5537099 | Receiving port security in a network concentrator | |||
137 | 5489896 | Network with a security capability | |||
1995 | |||||
138 | 5471459 | Method and apparatus for supervising access and protecting against unauthorized access in a communication metwork | |||
139 | 5457737 | Methods and apparatus to verify the identity of a cellular mobile phone | |||
140 | 5455828 | Carrier sensing multiple access/collision detection local area networks | |||
141 | 5440618 | System for checking the access to the data of a data unit | |||
142 | 5400334 | Message security on token ring networks | |||
143 | 5386470 | Repeaters for secure local area networks | |||
1994 | |||||
144 | 5353353 | Repeater security system | |||
145 | 5321747 | Method and apparatus for preventing extraneous detection of signal information | |||
1993 | |||||
146 | 5216713 | Method and apparatus for preventing extraneous detection of signal information | |||
147 | 5199072 | Method and apparatus for restricting access within a wireless local area network | |||
148 | 5181238 | Authenticated communications access service | |||
1992 | |||||
149 | 5161192 | Repeaters for secure local area networks | |||
150 | 5124984 | Access controller for local area network | |||
1991 | |||||
151 | 5001750 | Secret communication control apparatus | |||
152 | 4982430 | Bootstrap channel security arrangement for communication network | |||
1990 | |||||
153 | 4910777 | Packet switching architecture providing encryption across packets | |||
154 | 4901348 | Data transmission security arrangement for a plurality of data stations sharing access to a communication network | |||
1989 | |||||
155 | 4866772 | Communication system | |||
156 | 4823389 | Method and circuit apparatus for checking the authorization of access to a signal processing system | |||
1987 | |||||
157 | 4679226 | Computer security guard circuit | |||
158 | 4638356 | Apparatus and method for restricting access to a communication network | |||
1986 | |||||
159 | 4626623 | Method and apparatus for telephone access security | |||
160 | 4604499 | Computer telephone access security processor | |||
1985 | |||||
161 | 4546213 | Modem security device | |||
162 | 4531023 | Computer security system for a time shared computer accessed over telephone lines | |||
1984 | |||||
163 | 4484306 | Method and apparatus for controlling access in a data transmission system | |||
1980 | |||||
164 | 4193061 | Electronic authentication system | |||
1978 | |||||
165 | 4114139 | Security controlled information exchange system | |||
166 | 4093819 | Closed user group facility | |||
1976 | |||||
167 | 3984637 | Computer terminal security system | |||
© 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017 |