Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
W Milliken, W Strayer, S Milligan - US Patent App. 10/654,771, 2004 - Google Patents
ABSTRACT A System (120) detects transmission of potentially unwanted e-mail messages.
The System (120) may receive e-mail messages and generate hash values based on one or …
The System (120) may receive e-mail messages and generate hash values based on one or …
Peer-to-peer communication traversing symmetric network address translators
Y Takeda - US Patent 8,224,985, 2012 - Google Patents
Disclosed are systems and methods for peer-to-peer commu nication over a network
between a first node behind a first network address translator (NAT) and a second node …
between a first node behind a first network address translator (NAT) and a second node …
Methods and apparatus for redirecting attacks on a network
M Feghali, A Young, M Murthy, JF Wakerly… - US Patent …, 2016 - Google Patents
2013-11-13 Assigned to ATTIVO NETWORKS, INC. reassignment ATTIVO NETWORKS,
INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS) …
INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS) …
Traversal of symmetric network address translator for multiple simultaneous connections
Y Takeda - US Patent 7,856,506, 2010 - Google Patents
Handling of multiple connections during NAT traversal for a node behind a symmetric NAT is
disclosed. The likelihood of connection failure during symmetric NAT traversal may be …
disclosed. The likelihood of connection failure during symmetric NAT traversal may be …
Identification of undesirable content in responses sent in reply to a user request for content
F Lee, JG Liang, E Chen, YJ Lin - US Patent 7,640,434, 2009 - Google Patents
(57) ABSTRACT A system identifies undesirable content in responses sent to a user, Such
as in e-mail or in downloadable files, from an Internet or intranet site. The system utilizes a …
as in e-mail or in downloadable files, from an Internet or intranet site. The system utilizes a …
Network communication with path MTU size discovery
Y Takeda, JE Marr, PR White - US Patent 7,995,478, 2011 - Google Patents
US PATENT DOCUMENTS 4,764,928 A 8/1988 Akerberg 4,787,051 A 11, 1988 Olson
4,843,568 A 6/1989 Krueger 5,128,671 A 7/1992 Thomas, Jr. 5,528,265 A 6, 1996 Harrison …
4,843,568 A 6/1989 Krueger 5,128,671 A 7/1992 Thomas, Jr. 5,528,265 A 6, 1996 Harrison …
Context-aware distributed firewall
J Zhou, A Sengupta - US Patent 9,692,727, 2017 - Google Patents
A context-aware distributed firewall scheme is provided. A firewall engine tasked to provide
firewall protection for a set of network addresses applies a reduced set of firewall rules that …
firewall protection for a set of network addresses applies a reduced set of firewall rules that …
Network configuration evaluation
AP Harris - US Patent 7,243,141, 2007 - Google Patents
Methods and apparatus for network configuration evalua tion. In one implementation, a
method of evaluating a network configuration includes: receiving an address mes sage at a …
method of evaluating a network configuration includes: receiving an address mes sage at a …
Software firewall control
D Abzarian, GD Cuellar - US Patent 8,392,981, 2013 - Google Patents
(57) ABSTRACT A Software firewall that may be simply configured using rules specified for
types of network interfaces rather than indi vidual network interfaces. The network types may …
types of network interfaces rather than indi vidual network interfaces. The network types may …
System and method for performing efficient computer virus scanning of transient messages using checksums in a distributed computing environment
D Libenzi, MCH Pak - US Patent 6,993,660, 2006 - Google Patents
A system and method for performing efficient computer virus scanning of transient messages
using checksums in a distributed computing environment is described. An incoming …
using checksums in a distributed computing environment is described. An incoming …