US4956769A
(en)
|
1988-05-16 |
1990-09-11 |
Sysmith, Inc. |
Occurence and value based security system for computer databases
|
US6850252B1
(en)
|
1999-10-05 |
2005-02-01 |
Steven M. Hoffberg |
Intelligent electronic appliance system and method
|
US5423044A
(en)
|
1992-06-16 |
1995-06-06 |
International Business Machines Corporation |
Shared, distributed lock manager for loosely coupled processing systems
|
US5564016A
(en)
|
1993-12-17 |
1996-10-08 |
International Business Machines Corporation |
Method for controlling access to a computer resource based on a timing policy
|
DE69427347T2
(de)
|
1994-08-15 |
2001-10-31 |
Ibm |
Verfahren und System zur verbesserten Zugriffssteuerung auf Basis der Rollen in verteilten und zentralisierten Rechnersystemen
|
AU1690597A
(en)
|
1996-01-11 |
1997-08-01 |
Mitre Corporation, The |
System for controlling access and distribution of digital property
|
US6151643A
(en)
|
1996-06-07 |
2000-11-21 |
Networks Associates, Inc. |
Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer
|
US6023765A
(en)
|
1996-12-06 |
2000-02-08 |
The United States Of America As Represented By The Secretary Of Commerce |
Implementation of role-based access control in multi-level secure systems
|
US7062781B2
(en)
|
1997-02-12 |
2006-06-13 |
Verizon Laboratories Inc. |
Method for providing simultaneous parallel secure command execution on multiple remote hosts
|
US6335972B1
(en)
|
1997-05-23 |
2002-01-01 |
International Business Machines Corporation |
Framework-based cryptographic key recovery system
|
US7546346B2
(en)
|
1997-07-28 |
2009-06-09 |
Juniper Networks, Inc. |
Workflow systems and methods for project management and information management
|
US7956894B2
(en)
|
1997-10-14 |
2011-06-07 |
William Rex Akers |
Apparatus and method for computerized multi-media medical and pharmaceutical data organization and transmission
|
US6678826B1
(en)
|
1998-09-09 |
2004-01-13 |
Communications Devices, Inc. |
Management system for distributed out-of-band security databases
|
AU6401999A
(en)
|
1998-09-28 |
2000-04-17 |
Argus Systems Group, Inc. |
Trusted compartmentalized computer operating system
|
US6941304B2
(en)
|
1998-11-17 |
2005-09-06 |
Kana Software, Inc. |
Method and apparatus for performing enterprise email management
|
US6510513B1
(en)
|
1999-01-13 |
2003-01-21 |
Microsoft Corporation |
Security services and policy enforcement for electronic data
|
US6601171B1
(en)
|
1999-02-18 |
2003-07-29 |
Novell, Inc. |
Deputization in a distributed computing system
|
US6694437B1
(en)
|
1999-06-22 |
2004-02-17 |
Institute For Information Technology |
System and method for on-demand access concentrator for virtual private networks
|
US6526513B1
(en)
|
1999-08-03 |
2003-02-25 |
International Business Machines Corporation |
Architecture for dynamic permissions in java
|
US8335775B1
(en)
|
1999-08-05 |
2012-12-18 |
Oracle International Corporation |
Versioning in internet file system
|
US6546096B1
(en)
|
1999-08-25 |
2003-04-08 |
Siemens Information And Communication Networks, Inc. |
Proximity detector for initiating automatic callback
|
US7634455B1
(en)
|
1999-09-23 |
2009-12-15 |
Agile Software Corporation |
Method and apparatus for providing controlled access to software objects and associated documents
|
US6978367B1
(en)
|
1999-10-21 |
2005-12-20 |
International Business Machines Corporation |
Selective data encryption using style sheet processing for decryption by a client proxy
|
US7680819B1
(en)
*
|
1999-11-12 |
2010-03-16 |
Novell, Inc. |
Managing digital identity information
|
US7251666B2
(en)
|
2000-02-01 |
2007-07-31 |
Internet Business Information Group |
Signature loop authorizing method and apparatus
|
US20020035521A1
(en)
|
2000-04-11 |
2002-03-21 |
Powers Raymond Vincent |
Appointment scheduling and method for secure to access to car keys for a loaner car
|
US20020026592A1
(en)
|
2000-06-16 |
2002-02-28 |
Vdg, Inc. |
Method for automatic permission management in role-based access control systems
|
US7197638B1
(en)
|
2000-08-21 |
2007-03-27 |
Symantec Corporation |
Unified permissions control for remotely and locally stored files whose informational content may be protected by smart-locking and/or bubble-protection
|
US6804773B1
(en)
|
2000-10-03 |
2004-10-12 |
Dell Products L.P. |
System and method for transferring information over a network
|
US8677505B2
(en)
|
2000-11-13 |
2014-03-18 |
Digital Doors, Inc. |
Security system with extraction, reconstruction and secure recovery and storage of data
|
US6735601B1
(en)
|
2000-12-29 |
2004-05-11 |
Vmware, Inc. |
System and method for remote file access by computer
|
US6947989B2
(en)
|
2001-01-29 |
2005-09-20 |
International Business Machines Corporation |
System and method for provisioning resources to users based on policies, roles, organizational information, and attributes
|
US7302634B2
(en)
*
|
2001-03-14 |
2007-11-27 |
Microsoft Corporation |
Schema-based services for identity-based data access
|
US7150037B2
(en)
|
2001-03-21 |
2006-12-12 |
Intelliden, Inc. |
Network configuration manager
|
US7380271B2
(en)
|
2001-07-12 |
2008-05-27 |
International Business Machines Corporation |
Grouped access control list actions
|
US7299496B2
(en)
|
2001-08-14 |
2007-11-20 |
Illinois Institute Of Technology |
Detection of misuse of authorized access in an information retrieval system
|
US7028225B2
(en)
|
2001-09-25 |
2006-04-11 |
Path Communications, Inc. |
Application manager for monitoring and recovery of software based application processes
|
EP1315065B1
(en)
|
2001-11-23 |
2007-10-10 |
Protegrity Research & Development |
Method for intrusion detection in a database system
|
US20030115148A1
(en)
|
2001-12-13 |
2003-06-19 |
Takhar Harinder Singh |
Method and apparatus for processing a secure transaction
|
US7269729B2
(en)
|
2001-12-28 |
2007-09-11 |
International Business Machines Corporation |
Relational database management encryption system
|
US20030139962A1
(en)
|
2002-01-23 |
2003-07-24 |
Nobrega Francis H. |
Web based sevice request and approval system
|
US8244549B1
(en)
|
2002-04-11 |
2012-08-14 |
SJS Holdings, LLC |
Method and system for providing and managing a fractional aircraft ownership program
|
US7257713B2
(en)
|
2002-05-24 |
2007-08-14 |
International Business Machines Corporation |
Automatic password configuration during error reporting
|
US6950825B2
(en)
|
2002-05-30 |
2005-09-27 |
International Business Machines Corporation |
Fine grained role-based access to system resources
|
US20050089027A1
(en)
|
2002-06-18 |
2005-04-28 |
Colton John R. |
Intelligent optical data switching system
|
US7356836B2
(en)
|
2002-06-28 |
2008-04-08 |
Microsoft Corporation |
User controls for a computer
|
US7353532B2
(en)
|
2002-08-30 |
2008-04-01 |
International Business Machines Corporation |
Secure system and method for enforcement of privacy policy and protection of confidentiality
|
CA2406569C
(en)
|
2002-10-04 |
2011-03-22 |
Ibm Canada Limited-Ibm Canada Limitee |
Method and apparatus for enabling associated portlets of a web portal to collaborate for synchronized content display
|
US7205883B2
(en)
|
2002-10-07 |
2007-04-17 |
Safenet, Inc. |
Tamper detection and secure power failure recovery circuit
|
US6886101B2
(en)
|
2002-10-30 |
2005-04-26 |
American Express Travel Related Services Company, Inc. |
Privacy service
|
US20050021352A1
(en)
|
2002-11-05 |
2005-01-27 |
Maierhofer Ronald P. |
Sports club creation, management, and operation system and methods therefor
|
US7779247B2
(en)
|
2003-01-09 |
2010-08-17 |
Jericho Systems Corporation |
Method and system for dynamically implementing an enterprise resource policy
|
US20040162899A1
(en)
|
2003-02-14 |
2004-08-19 |
Cisco Technology, Inc. |
Terminating a session in a network
|
US20040162781A1
(en)
|
2003-02-14 |
2004-08-19 |
Kennsco, Inc. |
Monitoring and alert systems and methods
|
WO2004077848A2
(en)
|
2003-02-21 |
2004-09-10 |
Ge Interlogix, Inc. |
Key control with real time communications to remote locations
|
US7403925B2
(en)
|
2003-03-17 |
2008-07-22 |
Intel Corporation |
Entitlement security and control
|
GB2404489A
(en)
|
2003-07-31 |
2005-02-02 |
Sony Uk Ltd |
Access control for digital storage medium content
|
US7827595B2
(en)
|
2003-08-28 |
2010-11-02 |
Microsoft Corporation |
Delegated administration of a hosted resource
|
US9361602B1
(en)
|
2003-10-14 |
2016-06-07 |
Novell, Inc. |
Temporary electronic mail addresses
|
US20050132225A1
(en)
|
2003-12-16 |
2005-06-16 |
Glenn Gearhart |
Method and system for cyber-security vulnerability detection and compliance measurement (CDCM)
|
US7496191B1
(en)
|
2003-12-17 |
2009-02-24 |
Sprint Communications Company L.P. |
Integrated privacy rules engine and application
|
US8099503B2
(en)
|
2003-12-23 |
2012-01-17 |
Microsoft Corporation |
Methods and systems for providing secure access to a hosted service via a client application
|
US7512971B2
(en)
|
2004-01-29 |
2009-03-31 |
Newisys, Inc. |
Method and system for enabling remote access to a computer system
|
US7680822B1
(en)
|
2004-02-11 |
2010-03-16 |
Novell, Inc. |
Method and system for automatically creating and updating access controls lists
|
US7640429B2
(en)
|
2004-02-26 |
2009-12-29 |
The Boeing Company |
Cryptographically enforced, multiple-role, policy-enabled object dissemination control mechanism
|
US7490083B2
(en)
|
2004-02-27 |
2009-02-10 |
International Business Machines Corporation |
Parallel apply processing in data replication with preservation of transaction integrity and source ordering of dependent updates
|
DE602004007879T2
(de)
|
2004-03-18 |
2008-04-17 |
Alcatel Lucent |
Dienstbereitstellungssystem
|
US7644285B1
(en)
|
2004-04-08 |
2010-01-05 |
Intuit Inc. |
Recovery access to secure data
|
WO2005106624A1
(en)
|
2004-05-05 |
2005-11-10 |
Research In Motion Limited |
System and method for surely but conveniently causing reset of a computerized device
|
US7673139B1
(en)
|
2004-05-06 |
2010-03-02 |
Symantec Corporation |
Protecting administrative privileges
|
HK1062792A2
(en)
|
2004-06-16 |
2004-11-05 |
Pccw Hkt Datacom Services Ltd |
Dual-path pre-approval authentication method
|
US20060004588A1
(en)
|
2004-06-30 |
2006-01-05 |
Mohan Ananda |
Method and system for obtaining, maintaining and distributing data
|
US7383462B2
(en)
|
2004-07-02 |
2008-06-03 |
Hitachi, Ltd. |
Method and apparatus for encrypted remote copy for secure data backup and restoration
|
US9436820B1
(en)
|
2004-08-02 |
2016-09-06 |
Cisco Technology, Inc. |
Controlling access to resources in a network
|
US7373516B2
(en)
|
2004-08-19 |
2008-05-13 |
International Business Machines Corporation |
Systems and methods of securing resources through passwords
|
US20060048224A1
(en)
|
2004-08-30 |
2006-03-02 |
Encryptx Corporation |
Method and apparatus for automatically detecting sensitive information, applying policies based on a structured taxonomy and dynamically enforcing and reporting on the protection of sensitive data through a software permission wrapper
|
US20060075144A1
(en)
|
2004-09-24 |
2006-04-06 |
International Business Machines Corp. |
Remote access to a local hard drive
|
US8402141B2
(en)
|
2004-09-28 |
2013-03-19 |
International Business Machines Corporation |
Gracefully reestablishing an expired browser session
|
US7818781B2
(en)
|
2004-10-01 |
2010-10-19 |
Microsoft Corporation |
Behavior blocking access control
|
US7506364B2
(en)
|
2004-10-01 |
2009-03-17 |
Microsoft Corporation |
Integrated access authorization
|
US20060090196A1
(en)
|
2004-10-21 |
2006-04-27 |
Van Bemmel Jeroen |
Method, apparatus and system for enforcing security policies
|
US8346910B2
(en)
|
2004-11-30 |
2013-01-01 |
American Express Travel Related Services Company, Inc. |
Method and apparatus for managing an interactive network session
|
US7734670B2
(en)
|
2004-12-15 |
2010-06-08 |
Microsoft Corporation |
Actionable email documents
|
US20060137007A1
(en)
|
2004-12-16 |
2006-06-22 |
Nokia Corporation |
Revoking a permission for a program
|
US7607164B2
(en)
|
2004-12-23 |
2009-10-20 |
Microsoft Corporation |
Systems and processes for managing policy change in a distributed enterprise
|
TWI255408B
(en)
|
2004-12-24 |
2006-05-21 |
Hon Hai Prec Ind Co Ltd |
System and method for client linking with server automatically
|
CN1794717A
(zh)
|
2004-12-25 |
2006-06-28 |
鸿富锦精密工业(深圳)有限公司 |
客户端与服务器自动连线的系统及方法
|
US7681226B2
(en)
|
2005-01-28 |
2010-03-16 |
Cisco Technology, Inc. |
Methods and apparatus providing security for multiple operational states of a computerized device
|
US8171138B2
(en)
|
2005-02-15 |
2012-05-01 |
Microsoft Corporation |
System and method for applying flexible attributes to execute asynchronous network requests
|
US7539682B2
(en)
|
2005-03-14 |
2009-05-26 |
Microsoft Corporation |
Multilevel secure database
|
EP1866767B1
(en)
|
2005-03-16 |
2018-04-18 |
III Holdings 12, LLC |
Automatic workload transfer to an on-demand center
|
US7426654B2
(en)
|
2005-04-14 |
2008-09-16 |
Verizon Business Global Llc |
Method and system for providing customer controlled notifications in a managed network services system
|
US7831833B2
(en)
|
2005-04-22 |
2010-11-09 |
Citrix Systems, Inc. |
System and method for key recovery
|
JP4791760B2
(ja)
|
2005-05-17 |
2011-10-12 |
株式会社リコー |
アクセス制御装置、アクセス制御方法、及びアクセス制御プログラム
|
JP4643707B2
(ja)
|
2005-05-23 |
2011-03-02 |
エスエーピー・ガバナンス・リスク・アンド・コンプライアンス・インコーポレーテッド |
アクセス・エンフォーサー
|
US7568237B2
(en)
*
|
2005-05-26 |
2009-07-28 |
Health Allianze |
Access control list with convolution-weakened authorization
|
EP2228969B1
(en)
|
2005-06-09 |
2017-04-19 |
Whirlpool Corporation |
Software architecture system and method for communication with, and management of, at least one component within a household appliance
|
JP4556144B2
(ja)
|
2005-06-17 |
2010-10-06 |
日本電気株式会社 |
情報処理装置、復旧装置、プログラム及び復旧方法
|
US8438647B2
(en)
|
2005-07-14 |
2013-05-07 |
Imation Corp. |
Recovery of encrypted data from a secure storage device
|
US7631045B2
(en)
|
2005-07-14 |
2009-12-08 |
Yahoo! Inc. |
Content router asynchronous exchange
|
US7945942B2
(en)
|
2005-07-15 |
2011-05-17 |
Microsoft Corporation |
System and methods for exchanging user interface data in a multi-user system
|
JP4580845B2
(ja)
|
2005-08-24 |
2010-11-17 |
パナソニック株式会社 |
タスク実行装置
|
US8166068B2
(en)
|
2005-09-02 |
2012-04-24 |
Qwest |
Location based authorization of financial card transactions systems and methods
|
US8046558B2
(en)
|
2005-09-16 |
2011-10-25 |
The Research Foundation Of State University Of New York |
File system having predictable real-time performance
|
US7747280B2
(en)
|
2005-09-19 |
2010-06-29 |
Silverbrook Research Pty Ltd |
Retrieving a product via a coded surface
|
US8700439B2
(en)
|
2005-09-27 |
2014-04-15 |
Morgan Stanley |
Action console framework
|
US20070083452A1
(en)
|
2005-10-07 |
2007-04-12 |
Jan Mayle |
Securities trade monitoring and evaluation system
|
US20070094334A1
(en)
|
2005-10-21 |
2007-04-26 |
Microsoft Corporation |
Service/client synchronization
|
WO2007047798A1
(en)
|
2005-10-21 |
2007-04-26 |
Sensis Corporation |
Method and apparatus for providing secure access control for protected information
|
US20070143851A1
(en)
|
2005-12-21 |
2007-06-21 |
Fiberlink |
Method and systems for controlling access to computing resources based on known security vulnerabilities
|
FR2895611B1
(fr)
|
2005-12-23 |
2008-02-22 |
Thales Sa |
Architecture et procede pour controler le transfert d'informations entre utilisateurs
|
US8296827B2
(en)
|
2005-12-29 |
2012-10-23 |
International Business Machines Corporation |
Method for enabling an administrator to configure a recovery password
|
US7815106B1
(en)
|
2005-12-29 |
2010-10-19 |
Verizon Corporate Services Group Inc. |
Multidimensional transaction fraud detection system and method
|
US7954152B2
(en)
|
2005-12-30 |
2011-05-31 |
Microsoft Corporation |
Session management by analysis of requests and responses
|
US20070157155A1
(en)
|
2005-12-30 |
2007-07-05 |
Peters Eric C |
System and method for software generation and execution
|
US8515336B2
(en)
|
2006-01-06 |
2013-08-20 |
Qualcomm Incorporated |
Apparatus and methods of selective collection and selective presentation of content
|
US20070180100A1
(en)
|
2006-01-31 |
2007-08-02 |
Microsoft Corporation |
Realtime Approval Control
|
US20070185875A1
(en)
|
2006-02-09 |
2007-08-09 |
International Business Machines Corporation |
Extensible role based authorization for manageable resources
|
US8533271B2
(en)
|
2006-02-10 |
2013-09-10 |
Oracle International Corporation |
Electronic mail recovery utilizing recorded mapping table
|
US8561146B2
(en)
|
2006-04-14 |
2013-10-15 |
Varonis Systems, Inc. |
Automatic folder access management
|
WO2008039241A1
(en)
|
2006-04-21 |
2008-04-03 |
Av Tech, Inc |
Methodology, system and computer readable medium for detecting and managing malware threats
|
US7552467B2
(en)
|
2006-04-24 |
2009-06-23 |
Jeffrey Dean Lindsay |
Security systems for protecting an asset
|
US8396711B2
(en)
|
2006-05-01 |
2013-03-12 |
Microsoft Corporation |
Voice authentication system and method
|
US20070261099A1
(en)
|
2006-05-02 |
2007-11-08 |
Broussard Scott J |
Confidential content reporting system and method with electronic mail verification functionality
|
US8131763B2
(en)
|
2006-05-03 |
2012-03-06 |
Cellco Partnership |
Age verification and content filtering systems and methods
|
US8769604B2
(en)
|
2006-05-15 |
2014-07-01 |
Oracle International Corporation |
System and method for enforcing role membership removal requirements
|
US20070266135A1
(en)
|
2006-05-15 |
2007-11-15 |
Liam Friedland |
Multiple active session management interface
|
CN101079832B
(zh)
|
2006-05-23 |
2012-03-21 |
朗迅科技公司 |
Ims网关系统以及操作ims网关设备的方法
|
US9363675B2
(en)
|
2006-06-15 |
2016-06-07 |
Cisco Technology, Inc. |
Distributed wireless security system
|
US20070294258A1
(en)
|
2006-06-20 |
2007-12-20 |
American International Group, Inc. |
System and method for incident reporting
|
US8312516B1
(en)
|
2006-06-20 |
2012-11-13 |
Workday, Inc. |
Security permissions with dynamic definition
|
US20080083037A1
(en)
|
2006-10-03 |
2008-04-03 |
Rmcl, Inc. |
Data loss and theft protection method
|
JP4551380B2
(ja)
|
2006-10-04 |
2010-09-29 |
株式会社日立製作所 |
認証システムおよびその方法
|
US8458455B2
(en)
|
2006-10-10 |
2013-06-04 |
International Business Machines Corporation |
Techniques for handling SSL certificate expiration and renewal
|
US20080091681A1
(en)
|
2006-10-12 |
2008-04-17 |
Saket Dwivedi |
Architecture for unified threat management
|
US8195488B1
(en)
|
2006-10-20 |
2012-06-05 |
Orbidyne, Inc. |
System and methods for managing dynamic teams
|
US7950049B2
(en)
|
2006-10-24 |
2011-05-24 |
Avatier Corporation |
Hybrid meta-directory
|
US8931057B2
(en)
|
2006-10-24 |
2015-01-06 |
Avatier Corporation |
Apparatus and method for access validation
|
US20080103916A1
(en)
|
2006-10-31 |
2008-05-01 |
Jon Carlo Camarador |
Apparatuses, methods, and systems for capital management product enrollment
|
US8085936B2
(en)
|
2006-11-27 |
2011-12-27 |
Echoworx Corporation |
Method and system for content management in a secure communication system
|
US20080127354A1
(en)
|
2006-11-28 |
2008-05-29 |
Microsoft Corporation |
Condition based authorization model for data access
|
US7783973B2
(en)
|
2006-12-06 |
2010-08-24 |
International Business Machines Corporation |
Change approvals for computing systems
|
US20080154774A1
(en)
|
2006-12-21 |
2008-06-26 |
Move, Inc. |
Systems and methods for managing access to real estate content
|
US8255539B2
(en)
|
2006-12-29 |
2012-08-28 |
Amadeus Sas |
System and method for extending sessions
|
US8032558B2
(en)
|
2007-01-10 |
2011-10-04 |
Novell, Inc. |
Role policy management
|
US7950051B1
(en)
|
2007-01-30 |
2011-05-24 |
Sprint Communications Company L.P. |
Password management for a communication network
|
US20080195936A1
(en)
|
2007-02-09 |
2008-08-14 |
Fortent Limited |
Presenting content to a browser
|
US8310923B1
(en)
|
2007-03-27 |
2012-11-13 |
Amazon Technologies, Inc. |
Monitoring a network site to detect adverse network conditions
|
WO2008124478A1
(en)
|
2007-04-04 |
2008-10-16 |
Pronia Medical Systems, Llc |
Systems, methods, and computer program product for improved management of medical procedures for patients on medical protocols
|
US8255696B2
(en)
|
2007-05-01 |
2012-08-28 |
Microsoft Corporation |
One-time password access to password-protected accounts
|
US7975292B2
(en)
|
2007-06-12 |
2011-07-05 |
Francisco Corella |
Secure password reset for application
|
WO2008154726A1
(en)
|
2007-06-18 |
2008-12-24 |
Peak Positioning Corporation |
Methods and systems for providing a wireless security service and/or a wireless technical support service for personal computers
|
US8281147B2
(en)
|
2007-06-21 |
2012-10-02 |
Microsoft Corporation |
Image based shared secret proxy for secure password entry
|
US8296384B2
(en)
|
2007-06-22 |
2012-10-23 |
Samsung Electronics Co., Ltd |
System and method for deferred message reminders and expiry extension
|
US20090006867A1
(en)
|
2007-06-29 |
2009-01-01 |
Alcatel Lucent |
System, device and method for providing data availability for lost/stolen portable communication devices
|
US8543443B2
(en)
|
2007-08-17 |
2013-09-24 |
Microsoft Corporation |
Visualizers for change management system
|
US8166476B2
(en)
|
2007-08-24 |
2012-04-24 |
Symantec Corporation |
On-demand access to a virtual representation of a physical computer system
|
US8789188B2
(en)
|
2007-10-05 |
2014-07-22 |
International Business Machines Corporation |
Method and apparatus for automatic determination of authorization requirements while editing or generating code
|
JP4990089B2
(ja)
|
2007-10-12 |
2012-08-01 |
株式会社日立製作所 |
格納データ暗号化機能内蔵ストレージ装置の暗号鍵をバックアップ及びリストアする計算機システム
|
US8565723B2
(en)
|
2007-10-17 |
2013-10-22 |
First Data Corporation |
Onetime passwords for mobile wallets
|
US8132231B2
(en)
|
2007-12-06 |
2012-03-06 |
International Business Machines Corporation |
Managing user access entitlements to information technology resources
|
US8544105B2
(en)
|
2007-12-24 |
2013-09-24 |
Qualcomm Incorporated |
Method and apparatus for managing policies for time-based licenses on mobile devices
|
US9705940B1
(en)
|
2008-01-11 |
2017-07-11 |
Avaya Inc. |
Simultaneous advanced call control for both simple and advanced SIP user agents
|
US20090193407A1
(en)
|
2008-01-29 |
2009-07-30 |
Viasat, Inc. |
Methods and Systems for Automatic Patch Creation for Client Updates
|
US20090210427A1
(en)
|
2008-02-15 |
2009-08-20 |
Chris Eidler |
Secure Business Continuity and Disaster Recovery Platform for Multiple Protected Systems
|
WO2009108943A2
(en)
|
2008-02-29 |
2009-09-03 |
Doyenz Incorporated |
Automation for virtualized it environments
|
JP4748174B2
(ja)
|
2008-03-25 |
2011-08-17 |
ブラザー工業株式会社 |
ネットワーク内デバイスの管理装置およびネットワーク内デバイス管理プログラム
|
US7996374B1
(en)
|
2008-03-28 |
2011-08-09 |
Symantec Corporation |
Method and apparatus for automatically correlating related incidents of policy violations
|
US20120030187A1
(en)
|
2008-04-24 |
2012-02-02 |
Marano Robert F |
System, method and apparatus for tracking digital content objects
|
US8112464B2
(en)
|
2008-04-28 |
2012-02-07 |
Microsoft Corporation |
On-demand access to container file directories
|
JP5083042B2
(ja)
|
2008-05-30 |
2012-11-28 |
富士通株式会社 |
アクセス制御ポリシーの遵守チェック用プログラム
|
US20110099552A1
(en)
|
2008-06-19 |
2011-04-28 |
Freescale Semiconductor, Inc |
System, method and computer program product for scheduling processor entity tasks in a multiple-processing entity system
|
US8165934B2
(en)
|
2008-06-20 |
2012-04-24 |
Micro Graphic Information Services Corp. |
Automated invoice processing software and services
|
US20090328023A1
(en)
|
2008-06-27 |
2009-12-31 |
Gregory Roger Bestland |
Implementing optimized installs around pre-install and post-install actions
|
US8442960B1
(en)
|
2008-06-30 |
2013-05-14 |
Symantec Corporation |
Systems and methods for process self-elevation
|
US8787579B2
(en)
|
2008-06-30 |
2014-07-22 |
Verizon Patent And Licensing Inc. |
Key-based content management and access systems and methods
|
US8055892B2
(en)
|
2008-07-18 |
2011-11-08 |
International Business Machines Corporation |
Provision of remote system recovery services
|
US20100023368A1
(en)
|
2008-07-28 |
2010-01-28 |
Verizon Data Services Llc |
Dynamic request workflow management method and system
|
US20100037056A1
(en)
|
2008-08-07 |
2010-02-11 |
Follis Benjamin D |
Method to support privacy preserving secure data management in archival systems
|
US8427305B2
(en)
|
2008-08-12 |
2013-04-23 |
John J. Madsen |
Global positioning satellite [GPS] based recovery device and risk management system for portable computing devices and data
|
US20100064072A1
(en)
|
2008-09-09 |
2010-03-11 |
Emulex Design & Manufacturing Corporation |
Dynamically Adjustable Arbitration Scheme
|
US9082085B2
(en)
|
2008-09-11 |
2015-07-14 |
International Business Machines Corporation |
Computing environment climate dependent policy management
|
JP4586913B2
(ja)
|
2008-09-19 |
2010-11-24 |
富士ゼロックス株式会社 |
文書管理システム、文書利用管理装置、及びプログラム
|
US8201224B1
(en)
|
2008-09-30 |
2012-06-12 |
Symantec Corporation |
Systems and methods for temporarily adjusting control settings on computing devices
|
US8527080B2
(en)
|
2008-10-02 |
2013-09-03 |
Applied Materials, Inc. |
Method and system for managing process jobs in a semiconductor fabrication facility
|
US20100088341A1
(en)
|
2008-10-08 |
2010-04-08 |
Christian Ah-Soon |
Computing data security settings in a multi-dimensional system
|
US20100091318A1
(en)
|
2008-10-09 |
2010-04-15 |
Andrew Rodney Ferlitsch |
Systems and methods for multiple queue options for a single logical printer
|
US8102029B2
(en)
|
2008-10-31 |
2012-01-24 |
Fairchild Semiconductor Corporation |
Wafer level buck converter
|
US8909925B2
(en)
|
2008-11-17 |
2014-12-09 |
Prakash Baskaran |
System to secure electronic content, enforce usage policies and provide configurable functionalities
|
US20100125891A1
(en)
|
2008-11-17 |
2010-05-20 |
Prakash Baskaran |
Activity Monitoring And Information Protection
|
KR100926098B1
(ko)
|
2008-11-18 |
2009-11-11 |
주식회사 네오플 |
스냅샷 데이터베이스를 이용한 정보 복구 방법 및 장치
|
US20100153695A1
(en)
|
2008-12-16 |
2010-06-17 |
Microsoft Corporation |
Data handling preferences and policies within security policy assertion language
|
US8296554B2
(en)
|
2008-12-30 |
2012-10-23 |
Intel Corporation |
Pre-boot recovery of a locked computer system
|
US20100174575A1
(en)
|
2009-01-02 |
2010-07-08 |
International Business Machines Corporation |
Meeting management system with failover and failback capabilities for meeting moderators
|
US9026456B2
(en)
|
2009-01-16 |
2015-05-05 |
Oracle International Corporation |
Business-responsibility-centric identity management
|
US8387870B2
(en)
|
2009-01-16 |
2013-03-05 |
Secure Exchange Solutions, Llc |
Methods and systems for fabricating a transaction card incorporating a memory
|
US8898286B2
(en)
|
2010-06-04 |
2014-11-25 |
Broadcom Corporation |
Method and system for providing secure transactions via a broadband gateway
|
US8352717B2
(en)
|
2009-02-09 |
2013-01-08 |
Cs-Solutions, Inc. |
Recovery system using selectable and configurable snapshots
|
US8544083B2
(en)
|
2009-02-19 |
2013-09-24 |
Microsoft Corporation |
Identification security elevation
|
CA2695103A1
(en)
|
2009-02-26 |
2010-08-26 |
Research In Motion Limited |
System and method of handling encrypted backup data
|
US8856881B2
(en)
|
2009-02-26 |
2014-10-07 |
Genpact Global Holdings (Bermuda) Ltd. |
Method and system for access control by using an advanced command interface server
|
US8775674B2
(en)
|
2009-02-27 |
2014-07-08 |
Telecom Recovery |
Systems and methods for seamless communications recovery and backup using networked communication devices
|
US8302169B1
(en)
|
2009-03-06 |
2012-10-30 |
Google Inc. |
Privacy enhancements for server-side cookies
|
JP4724759B2
(ja)
|
2009-03-12 |
2011-07-13 |
富士通株式会社 |
アクセス制御装置、ストレージ装置、ネットワーク通信装置、アクセス制御方法、及びアクセス制御プログラム
|
US9207943B2
(en)
|
2009-03-17 |
2015-12-08 |
Qualcomm Incorporated |
Real time multithreaded scheduler and scheduling method
|
US8261126B2
(en)
|
2009-04-03 |
2012-09-04 |
Microsoft Corporation |
Bare metal machine recovery from the cloud
|
US9742779B2
(en)
|
2009-04-06 |
2017-08-22 |
Bomgar Corporation |
Method and apparatus for securely providing access and elevated rights for remote support
|
US8458764B2
(en)
|
2009-04-07 |
2013-06-04 |
International Business Machines Corporation |
Serialization of XACML policies
|
US8000264B2
(en)
|
2009-04-29 |
2011-08-16 |
Alcatel Lucent |
Configuration management of IP/MPLS router rings
|
US20100281173A1
(en)
|
2009-05-01 |
2010-11-04 |
Microsoft Corporation |
Delegated administration for remote management
|
US20100281059A1
(en)
|
2009-05-01 |
2010-11-04 |
Ebay Inc. |
Enhanced user profile
|
US20100287597A1
(en)
|
2009-05-07 |
2010-11-11 |
Microsoft Corporation |
Security policy trigger for policy enforcement
|
US7953896B2
(en)
*
|
2009-05-27 |
2011-05-31 |
Microsoft Corporation |
Managing user accounts and groups in multiple forests
|
US20110166897A1
(en)
|
2009-07-10 |
2011-07-07 |
Hope Beckman |
Parking system and method of employing same
|
US8631477B2
(en)
|
2009-07-23 |
2014-01-14 |
International Business Machines Corporation |
Lifecycle management of privilege sharing using an identity management system
|
KR101060181B1
(ko)
|
2009-08-03 |
2011-08-29 |
강원대학교산학협력단 |
원격 디버깅을 위한 웹 기반 소프트웨어 디버깅 장치 및 그 방법
|
US8826304B2
(en)
|
2009-08-13 |
2014-09-02 |
Google Inc. |
Virtual object indirection in a hosted computer environment
|
US20110061093A1
(en)
|
2009-09-09 |
2011-03-10 |
Ohad Korkus |
Time dependent access permissions
|
US9126120B2
(en)
|
2009-09-30 |
2015-09-08 |
Zynga Inc. |
Apparatuses, methods and systems for a virtual security camera
|
US20110078497A1
(en)
|
2009-09-30 |
2011-03-31 |
Lyne James I G |
Automated recovery from a security event
|
US8838629B2
(en)
|
2009-10-23 |
2014-09-16 |
American Express Travel Related Services Company, Inc. |
Anonymous information exchange
|
US8584221B2
(en)
|
2009-10-23 |
2013-11-12 |
Microsoft Corporation |
Authenticating using cloud authentication
|
WO2011063269A1
(en)
|
2009-11-20 |
2011-05-26 |
Alert Enterprise, Inc. |
Method and apparatus for risk visualization and remediation
|
US10019677B2
(en)
|
2009-11-20 |
2018-07-10 |
Alert Enterprise, Inc. |
Active policy enforcement
|
WO2011060508A1
(en)
|
2009-11-23 |
2011-05-26 |
Buchanan Brands Pty Ltd |
An activity recordal method and system
|
US20110126168A1
(en)
|
2009-11-25 |
2011-05-26 |
Crowdsource Technologies Ltd. |
Cloud plarform for managing software as a service (saas) resources
|
US8959621B2
(en)
|
2009-12-22 |
2015-02-17 |
Disney Enterprises, Inc. |
Human verification by contextually iconic visual public turing test
|
US9553727B2
(en)
|
2010-01-21 |
2017-01-24 |
Omid Ebrahimi Kia |
Secure and mobile biometric authentication for electronic health record management
|
US8904206B2
(en)
|
2010-01-26 |
2014-12-02 |
Motorola Mobility Llc |
Mobile computing device and method for maintaining application continuity
|
US9953178B2
(en)
|
2010-02-03 |
2018-04-24 |
Os Nexus, Inc. |
Role based access control utilizing scoped permissions
|
US20110191254A1
(en)
|
2010-02-04 |
2011-08-04 |
Accenture Global Services Gmbh |
Web User Interface
|
US8434128B2
(en)
|
2010-02-22 |
2013-04-30 |
Avaya Inc. |
Flexible security requirements in an enterprise network
|
US9129086B2
(en)
|
2010-03-04 |
2015-09-08 |
International Business Machines Corporation |
Providing security services within a cloud computing environment
|
US20110225139A1
(en)
|
2010-03-11 |
2011-09-15 |
Microsoft Corporation |
User role based customizable semantic search
|
US8646048B2
(en)
|
2010-03-31 |
2014-02-04 |
saleforce.com, inc |
System, method and computer program product for authenticating and authorizing an external entity
|
US8806578B2
(en)
|
2010-05-05 |
2014-08-12 |
Microsoft Corporation |
Data driven role based security
|
US20110289588A1
(en)
|
2010-05-20 |
2011-11-24 |
Anupam Sahai |
Unification of security monitoring and IT-GRC
|
CA2709651C
(en)
|
2010-06-07 |
2011-11-29 |
Guest Tek Interactive Entertainment Ltd. |
Hospitality media system operated by mobile device
|
WO2011159842A2
(en)
|
2010-06-15 |
2011-12-22 |
Nimbula, Inc. |
Virtual computing infrastructure
|
US8458779B2
(en)
|
2010-06-21 |
2013-06-04 |
Telefonaktiebolaget L M Ericsson (Publ) |
System and method for handling personal identification information
|
EP2586155A4
(en)
*
|
2010-06-23 |
2017-06-07 |
Hewlett-Packard Enterprise Development LP |
Authorization control
|
US8943603B2
(en)
|
2010-07-08 |
2015-01-27 |
Hewlett-Packard Development Company, L.P. |
System and method for document policy enforcement
|
US9529698B2
(en)
|
2010-07-13 |
2016-12-27 |
Salesforce.Com, Inc. |
Method and system for multi-mode testing through operation interface and scenario abstraction in a multi-tenant database environment
|
US8839397B2
(en)
|
2010-08-24 |
2014-09-16 |
Verizon Patent And Licensing Inc. |
End point context and trust level determination
|
US20120185911A1
(en)
|
2010-09-30 |
2012-07-19 |
Khandys Polite |
Mlweb: a multilevel web application framework
|
US8479041B2
(en)
|
2010-10-13 |
2013-07-02 |
International Business Machines Corporation |
Disaster recovery failback
|
WO2012071552A2
(en)
|
2010-11-24 |
2012-05-31 |
Coral Networks, Inc. |
System and method for access control and identity management
|
US8938644B2
(en)
|
2010-12-03 |
2015-01-20 |
Teradata Us, Inc. |
Query execution plan revision for error recovery
|
CN102571703A
(zh)
|
2010-12-23 |
2012-07-11 |
鸿富锦精密工业(深圳)有限公司 |
云数据安全管控系统及方法
|
US20120185933A1
(en)
|
2011-01-14 |
2012-07-19 |
Belk Andrew T |
User account for system protection or recovery
|
WO2012107058A1
(en)
|
2011-02-11 |
2012-08-16 |
Nec Europe Ltd. |
Method and system for supporting user authentication to a service
|
US8407776B2
(en)
|
2011-02-11 |
2013-03-26 |
Good Technology Corporation |
Method, apparatus and system for provisioning a push notification session
|
US8510335B2
(en)
|
2011-02-14 |
2013-08-13 |
Protegrity Corporation |
Database and method for controlling access to a database
|
US9369433B1
(en)
|
2011-03-18 |
2016-06-14 |
Zscaler, Inc. |
Cloud based social networking policy and compliance systems and methods
|
US9105009B2
(en)
|
2011-03-21 |
2015-08-11 |
Microsoft Technology Licensing, Llc |
Email-based automated recovery action in a hosted environment
|
US20120259720A1
(en)
|
2011-04-06 |
2012-10-11 |
Ebay Inc. |
Method and system to confirm ownership of digital goods
|
US8510842B2
(en)
|
2011-04-13 |
2013-08-13 |
International Business Machines Corporation |
Pinpointing security vulnerabilities in computer software applications
|
US20120311696A1
(en)
|
2011-06-02 |
2012-12-06 |
Microsoft Corporation |
Override for Policy Enforcement System
|
US20120317132A1
(en)
|
2011-06-07 |
2012-12-13 |
Microsoft Corporation |
Instance-Based Command Execution, Approval, and Notification Framework
|
CN102307185B
(zh)
*
|
2011-06-27 |
2015-02-25 |
北京大学 |
适用于存储云内的数据隔离方法
|
US8769622B2
(en)
|
2011-06-30 |
2014-07-01 |
International Business Machines Corporation |
Authentication and authorization methods for cloud computing security
|
US8868921B2
(en)
|
2011-07-20 |
2014-10-21 |
Daon Holdings Limited |
Methods and systems for authenticating users over networks
|
US8990906B2
(en)
|
2011-07-20 |
2015-03-24 |
Daon Holdings Limited |
Methods and systems for replacing shared secrets over networks
|
US9495393B2
(en)
|
2011-07-27 |
2016-11-15 |
EMC IP Holding Company, LLC |
System and method for reviewing role definitions
|
US8782762B2
(en)
|
2011-08-17 |
2014-07-15 |
International Business Machines Corporation |
Building data security in a networked computing environment
|
US8649768B1
(en)
|
2011-08-24 |
2014-02-11 |
Cellco Partnership |
Method of device authentication and application registration in a push communication framework
|
US8615159B2
(en)
|
2011-09-20 |
2013-12-24 |
Citrix Systems, Inc. |
Methods and systems for cataloging text in a recorded session
|
US8793790B2
(en)
|
2011-10-11 |
2014-07-29 |
Honeywell International Inc. |
System and method for insider threat detection
|
US20130097091A1
(en)
|
2011-10-18 |
2013-04-18 |
Nokia Corporation |
Method and apparatus for generating auditing specifications
|
US8700946B2
(en)
|
2011-10-27 |
2014-04-15 |
Sungard Availability Services, Lp |
Dynamic resource allocation in recover to cloud sandbox
|
US20130132330A1
(en)
|
2011-11-22 |
2013-05-23 |
Motorola Mobility, Inc. |
Management of privacy settings for a user device
|
US20130133024A1
(en)
|
2011-11-22 |
2013-05-23 |
Microsoft Corporation |
Auto-Approval of Recovery Actions Based on an Extensible Set of Conditions and Policies
|
US8839257B2
(en)
|
2011-11-22 |
2014-09-16 |
Microsoft Corporation |
Superseding of recovery actions based on aggregation of requests for automated sequencing and cancellation
|
US8929546B2
(en)
|
2011-12-24 |
2015-01-06 |
Logmein, Inc. |
Motion-based authentication for a gesture-based computing device
|
US9245143B2
(en)
|
2012-02-09 |
2016-01-26 |
Microsoft Technology Licensing, Llc |
Security policy for device data
|
US8931045B2
(en)
|
2012-02-16 |
2015-01-06 |
Blackberry Limited |
Method and apparatus for management of multiple grouped resources on device
|
CN102571821A
(zh)
|
2012-02-22 |
2012-07-11 |
浪潮电子信息产业股份有限公司 |
一种云安全访问控制模型
|
US9460303B2
(en)
|
2012-03-06 |
2016-10-04 |
Microsoft Technology Licensing, Llc |
Operating large scale systems and cloud services with zero-standing elevated permissions
|
US9003502B2
(en)
|
2012-03-19 |
2015-04-07 |
Empire Technology Development Llc |
Hybrid multi-tenancy cloud platform
|
US9361468B2
(en)
*
|
2012-04-17 |
2016-06-07 |
Salesforce.Com, Inc. |
Method and system for granting access to secure data
|
US8788427B2
(en)
|
2012-05-18 |
2014-07-22 |
Active Network, Llc |
Limiting data exposure in authenticated multi-system transactions
|
US9374374B2
(en)
|
2012-06-19 |
2016-06-21 |
SecureMySocial, Inc. |
Systems and methods for securing social media for users and businesses and rewarding for enhancing security
|
US20140007205A1
(en)
|
2012-06-28 |
2014-01-02 |
Bytemobile, Inc. |
No-Click Log-In Access to User's Web Account Using a Mobile Device
|
US9348652B2
(en)
|
2012-07-02 |
2016-05-24 |
Vmware, Inc. |
Multi-tenant-cloud-aggregation and application-support system
|
US8713633B2
(en)
|
2012-07-13 |
2014-04-29 |
Sophos Limited |
Security access protection for user data stored in a cloud computing facility
|
US20140059651A1
(en)
*
|
2012-08-22 |
2014-02-27 |
Southern Company Services, Inc. |
Account Elevation Management
|
US9710664B2
(en)
|
2012-09-07 |
2017-07-18 |
Amrita Vishwa Vidyapeetham |
Security layer and methods for protecting tenant data in a cloud-mediated computing network
|
US8938622B2
(en)
|
2012-09-21 |
2015-01-20 |
Sap Ag |
Encryption in the cloud with customer controlled keys
|
CN102904892A
(zh)
*
|
2012-10-17 |
2013-01-30 |
浪潮(北京)电子信息产业有限公司 |
一种云计算数据中心操作系统的安全模型及策略
|
US9209973B2
(en)
*
|
2012-11-20 |
2015-12-08 |
Google Inc. |
Delegate authorization in cloud-based storage system
|
US8881249B2
(en)
*
|
2012-12-12 |
2014-11-04 |
Microsoft Corporation |
Scalable and automated secret management
|
US9477838B2
(en)
*
|
2012-12-20 |
2016-10-25 |
Bank Of America Corporation |
Reconciliation of access rights in a computing system
|
US9491268B2
(en)
|
2013-03-01 |
2016-11-08 |
Infinite Convergence Solutions, Inc. |
Method and devices for session timeout management
|
US9646293B2
(en)
|
2013-03-14 |
2017-05-09 |
Microsoft Technology Licensing, Llc |
In session charging notifications and recharging accounts
|
US8769644B1
(en)
|
2013-03-15 |
2014-07-01 |
Rightscale, Inc. |
Systems and methods for establishing cloud-based instances with independent permissions
|
US9721086B2
(en)
*
|
2013-03-15 |
2017-08-01 |
Advanced Elemental Technologies, Inc. |
Methods and systems for secure and reliable identity-based computing
|
US9141461B2
(en)
|
2013-06-23 |
2015-09-22 |
Intel Corporation |
Machine check architecture execution environment for non-microcoded processor
|
CN103312721B
(zh)
*
|
2013-07-04 |
2016-12-28 |
北京迈普华兴信息技术有限公司 |
一种云平台访问控制架构及其实现方法
|
JP5447722B1
(ja)
*
|
2013-07-17 |
2014-03-19 |
富士ゼロックス株式会社 |
情報処理システム及びプログラム
|
US9215226B2
(en)
*
|
2013-07-24 |
2015-12-15 |
Adobe Systems Incorporated |
Dynamically mapping users to groups
|
US9536065B2
(en)
*
|
2013-08-23 |
2017-01-03 |
Morphotrust Usa, Llc |
System and method for identity management
|
US9787657B2
(en)
|
2013-09-19 |
2017-10-10 |
Oracle International Corporation |
Privileged account plug-in framework—usage policies
|
US10225152B1
(en)
*
|
2013-09-30 |
2019-03-05 |
Amazon Technologies, Inc. |
Access control policy evaluation and remediation
|
US20150134523A1
(en)
|
2013-11-12 |
2015-05-14 |
Mastercard International Incorporated |
Telephone order payments authentication using phone number recognition
|
US9418236B2
(en)
*
|
2013-11-13 |
2016-08-16 |
Intuit Inc. |
Method and system for dynamically and automatically managing resource access permissions
|
CA2844724A1
(en)
|
2014-03-04 |
2015-09-04 |
Guest Tek Interactive Entertainment Ltd. |
Leveraging push notification capabilities of mobile app to send event-triggered invitations to upgrade service offered by hospitality establishment
|
US9838424B2
(en)
*
|
2014-03-20 |
2017-12-05 |
Microsoft Technology Licensing, Llc |
Techniques to provide network security through just-in-time provisioned accounts
|
CN104104513A
(zh)
*
|
2014-07-22 |
2014-10-15 |
浪潮电子信息产业股份有限公司 |
一种云端多租户数据存储安全隔离方法
|
CN104123616A
(zh)
*
|
2014-07-25 |
2014-10-29 |
南京邮电大学 |
一种面向多租户的云计算系统
|
US9652212B2
(en)
|
2014-09-24 |
2017-05-16 |
Oracle International Corporation |
Managing change events for devices in an enterprise system
|
US9432379B1
(en)
*
|
2014-10-09 |
2016-08-30 |
Emc Corporation |
Dynamic authorization in a multi-tenancy environment via tenant policy profiles
|
US10277522B1
(en)
*
|
2014-11-26 |
2019-04-30 |
Amazon Technologies, Inc. |
Automated association of computing resources with resource creators for usage allocation
|
US9762585B2
(en)
|
2015-03-19 |
2017-09-12 |
Microsoft Technology Licensing, Llc |
Tenant lockbox
|
US11057388B2
(en)
*
|
2015-05-08 |
2021-07-06 |
Craig Technical Consulting, Inc. |
Method and computer program product for creating enterprise management systems
|
US10931682B2
(en)
|
2015-06-30 |
2021-02-23 |
Microsoft Technology Licensing, Llc |
Privileged identity management
|