1
Randy Ekl
George Popovich, Randy L Ekl: Utilization of cognitive radios with mobile virtual private network (mvpn) solutions. Motorola, Motorola, November 5, 2009: US20090275286-A1

A method (300, 350) and a mobile system (140) of persisting a mobile communication session over a mobile virtual private network (MVPN) (170). Cognitive radio state information (150) representing a present state of at least one available cognitive radio communication link (180, 182) can be processed ...


2
Gil Shwed, Shlomo Kramer, Nir Zuk, Gil Dogon, Ehud Ben Reuven: System for securing the flow of and selectively modifying packets in a computer network. Check Point Software Technologies, Ladas & Parry, November 10, 1998: US05835726 (527 worldwide citation)

The present invention discloses a novel system for controlling the inbound and outbound data packet flow in a computer network. By controlling the packet flow in a computer network, private networks can be secured from outside attacks in addition to controlling the flow of packets from within the pr ...


3
David S Schneider, Michael B Ribet, Laurence R Lipstone, Daniel Jensen: Distributed administration of access to information. Gordon E Nelson, June 18, 2002: US06408336 (377 worldwide citation)

A scalable access filter that is used together with others like it in a virtual private network to control access by users at clients in the network to information resources provided by servers in the network. Each access filter use a local copy of an access control data base to determine whether an ...


4
David S Schneider, Laurence R Lipstone, Daniel Jensen, Michael B Ribet: Secure delivery of information in a network. Internet Dynamics, Gordon E Nelson, January 23, 2001: US06178505 (356 worldwide citation)

A scalable access filter that is used together with others like it in a virtual private network to control access by users at clients in the network to information resources provided by servers in the network. Each access filter use a local copy of an access control data base to determine whether an ...


5
David S Schneider, Laurence R Lipstone, Daniel Jensen, Michael B Ribet: Techniques for eliminating redundant access checking by access filters. Internet Dynamics, Gordon E Nelson, August 15, 2000: US06105027 (303 worldwide citation)

A scalable access filter that is used together with others like it in a virtual private network to control access by users at clients in the network to information resources provided by servers in the network. Each access filter uses a local copy of an access control data base to determine whether a ...


6
Quentin C Liu: Method and apparatus for managing a virtual private network. VPNet Technologies, Park & Vaughan, June 20, 2000: US06079020 (285 worldwide citation)

The present invention provides a method and an apparatus for managing a virtual private network operating over a public data network. This public data network has been augmented to include a plurality of virtual private network gateways so that communications across the virtual private network are c ...


7
Sidney A Gilbrech: Apparatus for implementing virtual private networks. VPNet Technologies, McCutchen Doyle Brown & Enersen, January 9, 2001: US06173399 (277 worldwide citation)

Protocols and architecture for secure virtual private networks. Intraenterprise data communications are supported in a secure manner over the Internet or other public network space with the implementation of secure virtual private networks. Members of a virtual private network group exchange data th ...


8
Edmund Colby Munger, Douglas Charles Schmidt, Robert Dunham Short III, Victor Larson, Michael Williamson: Agile network protocol for secure communications with assured system availability. Science Applications International Corporation, Banner & Witcoff, December 31, 2002: US06502135 (273 worldwide citation)

A plurality of computer nodes communicate using seemingly random Internet Protocol source and destination addresses. Data packets matching criteria defined by a moving window of valid addresses are accepted for further processing, while those that do not meet the criteria are quickly rejected. Impro ...


9
Jan Forslöw: Network-based mobile workgroup system. Interactive People Unplugged, Banner & Witcoff, October 11, 2005: US06954790 (257 worldwide citation)

A network-based mobile workgroup system has considerably wider appeal and application than normal virtual private networks in that it provides seamless mobility across a number of access technologies at the same time as it offers a granular security separation down to workgroup level. The mobile wor ...


10