1
Carolyn B McClain, Jim E Thatcher: System and method for filtering of web-based content stored on a proxy cache server. Novell, Schwegman Lundberg Woessner & Kluth P A, August 3, 2004: US06772214 (189 worldwide citation)

A system and method for filtering of web-based content in a proxy cache server environment provides a local network having a client, a directory server and a proxy cache server that caches predetermined Internet-derived web content within the network. When content is requested, it is vended to the c ...


2
Carolyn B McClain, Jim E Thatcher: System and method for filtering of web-based content stored on a proxy cache server. Novell, Schwegman Lundberg & Woessner P A, March 17, 2009: US07506055 (65 worldwide citation)

A system and method for filtering of web-based content in a proxy cache server environment provides a local network having a client, a directory server and a proxy cache server that caches predetermined Internet-derived web content within the network. When content is requested, it is vended to the c ...


3
Vishnu A Patankar, Robert Reichel, John J Lambert, Kedarnath A Dubhashi, Jim E Thatcher: Application identification and license enforcement. Microsoft Corporation, Lee & Hayes PLLC, December 9, 2008: US07464270 (2 worldwide citation)

The restriction of particular resources includes providing a digital signature for unauthorized resources based on a structure-related parameter of the resource. Thus, attempts at circumventing recognition of such resource will likely result in altering the overall functionality of the resource. Fur ...


4
Carolyn B McClain, Jim E Thatcher: System and method for filtering of web-based content stored on a proxy cache server. Novell, Schwegman Lundberg Woessner & Kluth Pa, January 27, 2005: US20050021796-A1

A system and method for filtering of web-based content in a proxy cache server environment provides a local network having a client, a directory server and a proxy cache server that caches predetermined Internet-derived web content within the network. When content is requested, it is vended to the c ...


5
Vishnu A Patankar, Robert Reichel, John J Lambert, Kedarnath A Dubhashi, Jim E Thatcher: Application identification and license enforcement. Microsoft Corporation, Lee & Hayes Pllc, January 27, 2005: US20050021971-A1

The restriction of particular resources includes providing a digital signature for unauthorized resources based on a structure-related parameter of the resource. Thus, attempts at circumventing recognition of such resource will likely result in altering the overall functionality of the resource. Fur ...