1
Samuel Bendinelli, Michael Herrick, John Keane, Christopher Macey: Methods and systems for enabling a tunnel between two computers on a network. Openreach, Finnegan Henderson Farabow Garrett & Dunner L, October 7, 2003: US06631416 (238 worldwide citation)

Methods and systems are provided for enabling a network between a first and a second processor using at least one additional processor separate from the first and second processors. In one embodiment, the first processor and the second processor may each be independently administered through the add ...


2
Samuel Bendinelli, Michael Herrick, John Keane, Christopher Macey, Mark Tuomenoksa, Jerold Francus, Jonathan Harwood, Brion Shimamoto, Joseph Ferraro: Methods and system for providing network services using at least one processor interfacing a base network. Corente, Finnegan Henderson Farabow Garrett & Dunner, February 20, 2007: US07181766 (135 worldwide citation)

Methods and systems are provided for providing network services using at least one processor, such as a network operations center that interfaces a base network. The network operations center may receive information identifying a user authorized to administer a first processor, which may be separate ...


3
Samuel Bendinelli, John Keane, Christopher Macey: Methods and systems for hairpins in virtual networks. Corente, Finnegan Henderson Farabow Garrett & Dunner L, May 16, 2006: US07047424 (64 worldwide citation)

Methods and systems are provided for enabling communication between a first processor and a second processor using at least one additional processor separate from the first and second processors, wherein one or more firewalls selectively restrict the communication. In one embodiment, the additional ...


4
John Keane, Christopher Macey, Samuel Bendinelli: Methods and systems for firewalling virtual private networks. Corente, Finnegan Henderson Farabow Garrett & Dunner, May 12, 2009: US07533409 (62 worldwide citation)

Methods, apparatus, and systems are provided for processing packets between a first and a second network. When a packet is received from the first network, information for routing the first packet is identified. Based on a first set of rules for processing the first packet and the information for ro ...


5
Mark Tuomenoksa, Samuel Bendinelli, Jerold Francus, Jonathan Harwood, Michael Herrick, John Keane, Christopher Macey, Brion Shimamoto: Method and system for managing and configuring virtual private networks. Corente, Finnegan Henderson Farabow Garrett & Dunner, February 20, 2007: US07181542 (50 worldwide citation)

Methods and systems are provided for enabling a network between a first and a second processor using at least one additional processor separate from the first and second processors. In one embodiment, the at least one additional processor receives information indicating a consent on behalf of the fi ...


6
Samuel Bendinelli, Michael Herrick, John Keane, Chistopher Macey: Methods and systems for an extranet. Finnegan Henderson Farabow, Garrett & Dunner, March 7, 2002: US20020029276-A1

Methods and systems are provided for enabling a network between a first and a second processor using at least one additional processor separate from the first and second processors. In one embodiment, the first processor and the second processor may each be independently administered through the add ...


7
Samuel Bendinelli, Michael Herrick, John Keane, Christopher Macey, Mark Tuomenoksa, Jerold Francus, Jonathan Harwood, Brion Shimamoto, Joseph Ferraro: Methods and system for providing network services using at least one processor interfacing a base network. Finnegan Henderson Farabow Garrett & Dunner, February 28, 2002: US20020026503-A1

Methods and systems are provided for providing network services using at least one processor, such as a network operations center that interfaces a base network. The network operations center may receive information identifying a user authorized to administer a first processor, which may be separate ...


8
Mark Tuomenoksa, Samuel Bendinelli, Jerold Francus, Jonathan Harwood, Michael Herrick, John Keane, Christopher Macey, Brion Shimamoto: Method and system for managing and configuring virtual private networks. Finnegan Henderson Farabow, Garrett & Dunner, February 21, 2002: US20020023210-A1

Methods and systems are provided for enabling a network between a first and a second processor using at least one additional processor separate from the first and second processors. In one embodiment, the at least one additional processor receives information indicating a consent on behalf of the fi ...


9
Samuel Bendinelli, John Keane, Christopher Macey: Methods and systems for hairpins in virtual networks. Finnegan Henderson Farabow Garrett & Dunner, May 2, 2002: US20020053031-A1

Methods and systems are provided for enabling communication between a first processor and a second processor using at least one additional processor separate from the first and second processors, wherein one or more firewalls selectively restrict the communication. In one embodiment, the additional ...


10
John Keane, Christopher Macey, Samuel Bendinelli: Methods and systems for firewalling virtual private networks. Opeanreach, Finnegan Henderson Farabow Garrett & Dunner, July 10, 2003: US20030131263-A1

Methods, apparatus, and systems are provided for processing packets between a first and a second network. When a packet is received from the first network, information for routing the first packet is identified. Based on a first set of rules for processing the first packet and the information for ro ...