1
Louis F Menditto, Barron C Housel, Tzu Ming Tsang, Mauro Zallocco, Gaurang K Shah, Jan Vilhuber, Anurag Bhargava, Pranav K Tiwari, Robert M Batz, Scott W Brim: System and method for processing a request for information in a network. Cisco Technology, Baker Botts L, December 27, 2005: US06981029 (252 worldwide citation)

An information service provider network includes a content gateway to process requests for information from a client terminal. The content gateway includes a router for receiving a request for information from the client terminal. The request includes a domain name and additional content. The router ...


2
Louis F Menditto, Barron C Housel, Tzu Ming Tsang, Mauro Zallocco, Gaurang K Shah, Jan Vilhuber, Anurag Bhargava, Pranav K Tiwari, Robert M Batz, Scott W Brim: System and method for processing a request for information in a network. Cisco Technology, Baker Botts L, March 10, 2009: US07502836 (207 worldwide citation)

An information service provider network includes a content gateway to process requests for information from a client terminal. The content gateway includes a router for receiving a request for information from the client terminal. The request includes a domain name and additional content. The router ...


3
Louis F Menditto, Barron C Housel, Tzu Ming Tsang, Mauro Zallocco, Gaurang K Shah, Jan Vilhuber, Anurag Bhargava, Pranav K Tiwari, Robert M Batz, Scott W Brim: System and method for qualifying requests in a network. Cisco Technology, Baker Botts L, November 22, 2005: US06968389 (148 worldwide citation)

An information service provider network includes a content gateway to process requests for information from a client terminal. The content gateway includes a router for receiving a domain name server query from an originator associated with a request for information. The router including a database ...


4
Ramesh Kalimuthu, Yogesh Kalley, Michael L Sullenberger, Jan Vilhuber: Method and apparatus for dynamically securing voice and other delay-sensitive network traffic. Cisco Technology, Hickman Palermo Truong & Becker, April 29, 2008: US07366894 (119 worldwide citation)

A request is received for secure network traffic from a device having a private network address at a source node. The private network address of a requested destination device is obtained at a destination node from a route server based on signaling information associated with the request. The public ...


5
Mark Baugher, David McGrew, Jan Vilhuber, Brian Weis: Method and apparatus for generating pairwise cryptographic transforms based on group keys. Cisco Technology, Hickman Palermo Truong & Becker, June 19, 2007: US07234063 (98 worldwide citation)

Group key management techniques are applied to generating pair-wise keys for point-to-point secure communication applications. Nodes participating in a secure communication group each receive a group key and associated policy information. When a first node wishes to establish a secure point-to-point ...


6
Jan Vilhuber: Validating connections to a network system. Cisco Technology, Hickman Palermo Truong & Becker, October 22, 2002: US06470453 (94 worldwide citation)

A mechanism for authenticating multiple connections to a network server is disclosed. A client establishes a first connection to the server. In establishing the first connection, the client provides authentication information and authorization information, and in response the server assigns first ac ...


7
Mark Baugher, David McGrew, Jan Vilhuber, Brian Weis: Method and apparatus for generating pairwise cryptographic transforms based on group keys. Cisco Technology, Hickman Palermo Truong & Becker, June 19, 2007: US07234058 (48 worldwide citation)

Group key management techniques are applied to generating pair-wise keys for point-to-point secure communication applications. Nodes participating in a secure communication group each receive a group key and associated policy information. When a first node wishes to establish a secure point-to-point ...


8
Jan Vilhuber: Validating connections to a network system. Cisco Technology, Hickman Palermo Truong & Becker, June 8, 2004: US06748543 (42 worldwide citation)

A mechanism for authenticating multiple connections to a network server is disclosed. A client establishes a first connection to the server. In establishing the first connection, the client provides authentication information and authorization information, and in response the server assigns first ac ...


9
Michael L Sullenberger, Jan Vilhuber: Method and apparatus for establishing a dynamic multipoint encrypted virtual private network. Cisco Technology, Hickman Palermo Truong Becker, November 4, 2008: US07447901 (41 worldwide citation)

A process is disclosed in which a security policy is associated with a virtual private network (VPN) interface at a first device, for example, a router. Input is received specifying an association of a VPN endpoint address to a corresponding routable network address of a second device. A message is ...


10
Jan Vilhuber, Max Pritikin: Method and apparatus for integrated provisioning of a network device with configuration information and identity certification. Cisco Technology, Hickman Palermo Truong & Becker, June 10, 2008: US07386721 (37 worldwide citation)

According to one aspect, a provisioning server comprises a configuration module that configures a network device and an identification certification module that certifies the identity of the network device. With use of the provisioning server, the network device does not require configuration with n ...