AU2001271927A1 - A system for logging access system events and providing identity management and access management for a network - Google Patents
A system for logging access system events and providing identity management and access management for a networkInfo
- Publication number
- AU2001271927A1 AU2001271927A1 AU2001271927A AU7192701A AU2001271927A1 AU 2001271927 A1 AU2001271927 A1 AU 2001271927A1 AU 2001271927 A AU2001271927 A AU 2001271927A AU 7192701 A AU7192701 A AU 7192701A AU 2001271927 A1 AU2001271927 A1 AU 2001271927A1
- Authority
- AU
- Australia
- Prior art keywords
- access
- management
- network
- logging
- providing identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
- G06F16/9535—Search customisation based on user profiles and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
- H04L61/4505—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
- H04L61/4523—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using lightweight directory access protocol [LDAP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/306—User profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/102—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Data Mining & Analysis (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US21695500P | 2000-07-10 | 2000-07-10 | |
US60216955 | 2000-07-10 | ||
US09792915 | 2001-02-26 | ||
US09/792,915 US9038170B2 (en) | 2000-07-10 | 2001-02-26 | Logging access system events |
PCT/US2001/021590 WO2002005487A1 (en) | 2000-07-10 | 2001-07-09 | A system for logging access system events and providing identity management and access management for a network |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2001271927A1 true AU2001271927A1 (en) | 2002-01-21 |
Family
ID=26911480
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2001271927A Abandoned AU2001271927A1 (en) | 2000-07-10 | 2001-07-09 | A system for logging access system events and providing identity management and access management for a network |
Country Status (3)
Country | Link |
---|---|
US (1) | US9038170B2 (en) |
AU (1) | AU2001271927A1 (en) |
WO (1) | WO2002005487A1 (en) |
Families Citing this family (75)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7194764B2 (en) | 2000-07-10 | 2007-03-20 | Oracle International Corporation | User authentication |
US6807547B2 (en) * | 2000-07-10 | 2004-10-19 | Sun Microsystems, Inc. | Method and apparatus for implementing timers for enterprise javabean components |
AU7693201A (en) * | 2000-07-27 | 2002-02-13 | Bea Systems Inc | System and method for concentration and load-balancing of requests |
US7257581B1 (en) * | 2000-08-04 | 2007-08-14 | Guardian Networks, Llc | Storage, management and distribution of consumer information |
US9928508B2 (en) * | 2000-08-04 | 2018-03-27 | Intellectual Ventures I Llc | Single sign-on for access to a central data repository |
US8566248B1 (en) | 2000-08-04 | 2013-10-22 | Grdn. Net Solutions, Llc | Initiation of an information transaction over a network via a wireless device |
US7185364B2 (en) | 2001-03-21 | 2007-02-27 | Oracle International Corporation | Access system interface |
US7302634B2 (en) * | 2001-03-14 | 2007-11-27 | Microsoft Corporation | Schema-based services for identity-based data access |
US7024662B2 (en) | 2001-03-14 | 2006-04-04 | Microsoft Corporation | Executing dynamically assigned functions while providing services |
US20050198379A1 (en) | 2001-06-13 | 2005-09-08 | Citrix Systems, Inc. | Automatically reconnecting a client across reliable and persistent communication sessions |
US8239531B1 (en) * | 2001-07-23 | 2012-08-07 | At&T Intellectual Property Ii, L.P. | Method and apparatus for connection to virtual private networks for secure transactions |
US20030033463A1 (en) * | 2001-08-10 | 2003-02-13 | Garnett Paul J. | Computer system storage |
US7225256B2 (en) | 2001-11-30 | 2007-05-29 | Oracle International Corporation | Impersonation in an access system |
US7941533B2 (en) | 2002-02-19 | 2011-05-10 | Jpmorgan Chase Bank, N.A. | System and method for single sign-on session management without central server |
US7984157B2 (en) | 2002-02-26 | 2011-07-19 | Citrix Systems, Inc. | Persistent and reliable session securely traversing network components using an encapsulating protocol |
US7661129B2 (en) * | 2002-02-26 | 2010-02-09 | Citrix Systems, Inc. | Secure traversal of network components |
US20030177390A1 (en) * | 2002-03-15 | 2003-09-18 | Rakesh Radhakrishnan | Securing applications based on application infrastructure security techniques |
US7793095B2 (en) * | 2002-06-06 | 2010-09-07 | Hardt Dick C | Distributed hierarchical identity management |
US7194767B1 (en) | 2002-06-28 | 2007-03-20 | Sprint Communications Company L.P. | Screened subnet having a secured utility VLAN |
US9886309B2 (en) | 2002-06-28 | 2018-02-06 | Microsoft Technology Licensing, Llc | Identity-based distributed computing for device resources |
US7814050B2 (en) * | 2002-10-22 | 2010-10-12 | Brocade Communications Systems, Inc. | Disaster recovery |
US7703128B2 (en) * | 2003-02-13 | 2010-04-20 | Microsoft Corporation | Digital identity management |
US8612590B1 (en) | 2003-04-11 | 2013-12-17 | International Business Machines Corporation | Method and apparatus for access management |
GB0308395D0 (en) * | 2003-04-11 | 2003-05-21 | Hewlett Packard Development Co | Delivery context aware activity on networks:devices, software and methods |
JP2004318552A (en) * | 2003-04-17 | 2004-11-11 | Kddi Corp | Device, method and program for supporting ids log analysis |
WO2004107139A1 (en) * | 2003-05-28 | 2004-12-09 | Belarc, Inc. | Secure user access subsystem for use in a computer information database system |
US7882132B2 (en) | 2003-10-09 | 2011-02-01 | Oracle International Corporation | Support for RDBMS in LDAP system |
US7904487B2 (en) | 2003-10-09 | 2011-03-08 | Oracle International Corporation | Translating data access requests |
EP1585005A1 (en) * | 2004-04-08 | 2005-10-12 | Thomson Multimedia Broadband Belgium | Security device and process and associated products |
US7444509B2 (en) * | 2004-05-27 | 2008-10-28 | International Business Machines Corporation | Method and system for certification path processing |
US8527752B2 (en) | 2004-06-16 | 2013-09-03 | Dormarke Assets Limited Liability | Graduated authentication in an identity management system |
US9245266B2 (en) | 2004-06-16 | 2016-01-26 | Callahan Cellular L.L.C. | Auditable privacy policies in a distributed hierarchical identity management system |
US8504704B2 (en) | 2004-06-16 | 2013-08-06 | Dormarke Assets Limited Liability Company | Distributed contact information management |
US7885934B2 (en) * | 2004-08-17 | 2011-02-08 | Teleran Technologies, Inc. | Monitoring and auditing system |
US7831833B2 (en) * | 2005-04-22 | 2010-11-09 | Citrix Systems, Inc. | System and method for key recovery |
US7958360B2 (en) * | 2005-05-12 | 2011-06-07 | Microsoft Corporation | Method and system for performing an electronic signature approval process |
US7849101B2 (en) * | 2005-05-12 | 2010-12-07 | Microsoft Corporation | Method and system for enabling an electronic signature approval process |
US9692725B2 (en) | 2005-05-26 | 2017-06-27 | Citrix Systems, Inc. | Systems and methods for using an HTTP-aware client agent |
US9621666B2 (en) | 2005-05-26 | 2017-04-11 | Citrix Systems, Inc. | Systems and methods for enhanced delta compression |
US8943304B2 (en) | 2006-08-03 | 2015-01-27 | Citrix Systems, Inc. | Systems and methods for using an HTTP-aware client agent |
US9407608B2 (en) | 2005-05-26 | 2016-08-02 | Citrix Systems, Inc. | Systems and methods for enhanced client side policy |
US20080189553A1 (en) * | 2005-07-22 | 2008-08-07 | David Eppert | Memory based authentication system |
US20070022300A1 (en) * | 2005-07-22 | 2007-01-25 | David Eppert | Memory based authentication system |
US20070032887A1 (en) * | 2005-07-26 | 2007-02-08 | Brother Kogyo Kabushiki Kaisha | Information management system, information processing device, and program |
US8209747B2 (en) * | 2006-01-03 | 2012-06-26 | Cisco Technology, Inc. | Methods and systems for correlating rules with corresponding event log entries |
US8688813B2 (en) | 2006-01-11 | 2014-04-01 | Oracle International Corporation | Using identity/resource profile and directory enablers to support identity management |
US8595794B1 (en) * | 2006-04-13 | 2013-11-26 | Xceedium, Inc. | Auditing communications |
US8561155B2 (en) | 2006-08-03 | 2013-10-15 | Citrix Systems, Inc. | Systems and methods for using a client agent to manage HTTP authentication cookies |
US8566925B2 (en) | 2006-08-03 | 2013-10-22 | Citrix Systems, Inc. | Systems and methods for policy based triggering of client-authentication at directory level granularity |
US8484718B2 (en) | 2006-08-03 | 2013-07-09 | Citrix System, Inc. | Systems and methods for enabling assured records using fine grained auditing of virtual private network traffic |
US8392977B2 (en) * | 2006-08-03 | 2013-03-05 | Citrix Systems, Inc. | Systems and methods for using a client agent to manage HTTP authentication cookies |
US8743778B2 (en) * | 2006-09-06 | 2014-06-03 | Devicescape Software, Inc. | Systems and methods for obtaining network credentials |
US9326138B2 (en) | 2006-09-06 | 2016-04-26 | Devicescape Software, Inc. | Systems and methods for determining location over a network |
US8646095B2 (en) * | 2006-11-30 | 2014-02-04 | Microsoft Corporation | Personal site privacy policy |
US7925694B2 (en) * | 2007-10-19 | 2011-04-12 | Citrix Systems, Inc. | Systems and methods for managing cookies via HTTP content layer |
US20090126007A1 (en) * | 2007-11-08 | 2009-05-14 | Avantia, Inc. | Identity management suite |
EP2241081B1 (en) | 2008-01-26 | 2018-05-02 | Citrix Systems, Inc. | Systems and methods for fine grain policy driven cookie proxying |
US8893242B2 (en) * | 2008-04-29 | 2014-11-18 | Ebay Inc. | System and method for pool-based identity generation and use for service access |
US20100263022A1 (en) * | 2008-10-13 | 2010-10-14 | Devicescape Software, Inc. | Systems and Methods for Enhanced Smartclient Support |
US8924592B2 (en) | 2009-09-29 | 2014-12-30 | Citrix Systems, Inc. | Synchronization of server-side cookies with client-side cookies |
US20110093367A1 (en) * | 2009-10-20 | 2011-04-21 | At&T Intellectual Property I, L.P. | Method, apparatus, and computer product for centralized account provisioning |
WO2012092261A2 (en) | 2010-12-29 | 2012-07-05 | Citrix Systems, Inc. | Systems and methods for multi-level tagging of encrypted items for additional security and efficient encrypted item determination |
WO2012112607A1 (en) | 2011-02-14 | 2012-08-23 | Devicescape Software, Inc. | Systems and methods for network curation |
US9237146B1 (en) | 2012-01-26 | 2016-01-12 | United Services Automobile Association | Quick-logon for computing device |
US10282531B1 (en) | 2012-01-26 | 2019-05-07 | United Services Automobile Association (Usaa) | Quick-logon for computing device |
US20150032700A1 (en) * | 2013-07-23 | 2015-01-29 | Yakov Z. Mermelstein | Electronic interactive personal profile |
US9912529B2 (en) | 2014-08-20 | 2018-03-06 | International Business Machines Corporation | Tenant-specific log for events related to a cloud-based service |
US9940340B2 (en) * | 2015-10-30 | 2018-04-10 | International Business Machines Corporation | Ensuring data maintenance within a LDAP environment |
US10333962B1 (en) * | 2016-03-30 | 2019-06-25 | Amazon Technologies, Inc. | Correlating threat information across sources of distributed computing systems |
CN110032879B (en) * | 2018-01-11 | 2023-10-20 | 中标软件有限公司 | User behavior security authentication and log audit method and system |
US10255415B1 (en) * | 2018-04-03 | 2019-04-09 | Palantir Technologies Inc. | Controlling access to computer resources |
US11075951B1 (en) * | 2018-06-29 | 2021-07-27 | NortonLifeLock Inc. | Query learning for automated incident investigation and remediation |
US11949677B2 (en) * | 2019-04-23 | 2024-04-02 | Microsoft Technology Licensing, Llc | Resource access based on audio signal |
US11704441B2 (en) | 2019-09-03 | 2023-07-18 | Palantir Technologies Inc. | Charter-based access controls for managing computer resources |
US11687633B2 (en) * | 2020-11-05 | 2023-06-27 | International Business Machines Corporation | Access authentication in AI systems |
Family Cites Families (121)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4484306A (en) * | 1982-03-22 | 1984-11-20 | Exide Electronics Corporation | Method and apparatus for controlling access in a data transmission system |
US5023773A (en) * | 1988-02-10 | 1991-06-11 | International Business Machines Corporation | Authorization for selective program access to data in multiple address spaces |
US4956769A (en) * | 1988-05-16 | 1990-09-11 | Sysmith, Inc. | Occurence and value based security system for computer databases |
US5077666A (en) * | 1988-11-07 | 1991-12-31 | Emtek Health Care Systems, Inc. | Medical information system with automatic updating of task list in response to charting interventions on task list window into an associated form |
US4961224A (en) * | 1989-03-06 | 1990-10-02 | Darby Yung | Controlling access to network resources |
US5113499A (en) * | 1989-04-28 | 1992-05-12 | Sprint International Communications Corp. | Telecommunication access management system for a packet switching network |
US5261102A (en) * | 1991-03-28 | 1993-11-09 | International Business Machines Corporation | System for determining direct and indirect user access privileges to data base objects |
JPH05197573A (en) * | 1991-08-26 | 1993-08-06 | Hewlett Packard Co <Hp> | Task controlling system with task oriented paradigm |
GB2263988B (en) * | 1992-02-04 | 1996-05-22 | Digital Equipment Corp | Work flow management system and method |
US5428795A (en) * | 1992-07-31 | 1995-06-27 | International Business Machines Corporation | Method of and apparatus for providing automatic security control of distributions within a data processing system |
AU6133594A (en) * | 1993-02-08 | 1994-08-29 | Action Technologies, Inc. | Method and apparatus for managing business processes |
US5455953A (en) * | 1993-11-03 | 1995-10-03 | Wang Laboratories, Inc. | Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket |
US5557742A (en) * | 1994-03-07 | 1996-09-17 | Haystack Labs, Inc. | Method and system for detecting intrusion into and misuse of a data processing system |
US6073174A (en) * | 1994-09-27 | 2000-06-06 | Bristish Telecommunications | Remote access systems |
US5764890A (en) * | 1994-12-13 | 1998-06-09 | Microsoft Corporation | Method and system for adding a secure network server to an existing computer network |
US6434531B1 (en) | 1995-02-28 | 2002-08-13 | Clinicomp International, Inc. | Method and system for facilitating patient care plans |
US5692125A (en) * | 1995-05-09 | 1997-11-25 | International Business Machines Corporation | System and method for scheduling linked events with fixed and dynamic conditions |
US5999911A (en) * | 1995-06-02 | 1999-12-07 | Mentor Graphics Corporation | Method and system for managing workflow |
US5678041A (en) * | 1995-06-06 | 1997-10-14 | At&T | System and method for restricting user access rights on the internet based on rating information stored in a relational database |
US5708780A (en) * | 1995-06-07 | 1998-01-13 | Open Market, Inc. | Internet server access control and monitoring systems |
GB2301912A (en) | 1995-06-09 | 1996-12-18 | Ibm | Security for computer system resources |
US5765153A (en) * | 1996-01-03 | 1998-06-09 | International Business Machines Corporation | Information handling system, method, and article of manufacture including object system authorization and registration |
US6006195A (en) * | 1996-04-26 | 1999-12-21 | Workgroup Technology Corporation | Product development system and method using integrated process and data management |
US6018619A (en) * | 1996-05-24 | 2000-01-25 | Microsoft Corporation | Method, system and apparatus for client-side usage tracking of information server systems |
US5740361A (en) * | 1996-06-03 | 1998-04-14 | Compuserve Incorporated | System for remote pass-phrase authentication |
US5918013A (en) * | 1996-06-03 | 1999-06-29 | Webtv Networks, Inc. | Method of transcoding documents in a network environment using a proxy server |
US5889952A (en) * | 1996-08-14 | 1999-03-30 | Microsoft Corporation | Access check system utilizing cached access permissions |
US5845267A (en) * | 1996-09-06 | 1998-12-01 | At&T Corp | System and method for billing for transactions conducted over the internet from within an intranet |
US5845067A (en) * | 1996-09-09 | 1998-12-01 | Porter; Jack Edward | Method and apparatus for document management utilizing a messaging system |
US5796393A (en) * | 1996-11-08 | 1998-08-18 | Compuserve Incorporated | System for intergrating an on-line service community with a foreign service |
US5991881A (en) * | 1996-11-08 | 1999-11-23 | Harris Corporation | Network surveillance system |
US6151531A (en) * | 1996-12-12 | 2000-11-21 | Charles Frankel Et Al | System and method for managing the alteration of garments |
US6393569B1 (en) | 1996-12-18 | 2002-05-21 | Alexander S. Orenshteyn | Secured system for accessing application services from a remote station |
US5884312A (en) * | 1997-02-28 | 1999-03-16 | Electronic Data Systems Corporation | System and method for securely accessing information from disparate data sources through a network |
US7272625B1 (en) * | 1997-03-10 | 2007-09-18 | Sonicwall, Inc. | Generalized policy server |
US6212558B1 (en) * | 1997-04-25 | 2001-04-03 | Anand K. Antur | Method and apparatus for configuring and managing firewalls and security devices |
US5944824A (en) * | 1997-04-30 | 1999-08-31 | Mci Communications Corporation | System and method for single sign-on to a plurality of network elements |
US6170017B1 (en) * | 1997-05-08 | 2001-01-02 | International Business Machines Corporation | Method and system coordinating actions among a group of servers |
US6578113B2 (en) * | 1997-06-02 | 2003-06-10 | At&T Corp. | Method for cache validation for proxy caches |
US5991810A (en) * | 1997-08-01 | 1999-11-23 | Novell, Inc. | User name authentication for gateway clients accessing a proxy cache server |
US6463418B1 (en) | 1997-08-15 | 2002-10-08 | Sun Microsystems, Inc. | Secure and stateful electronic business transaction system |
US5991878A (en) * | 1997-09-08 | 1999-11-23 | Fmr Corp. | Controlling access to information |
US6574661B1 (en) * | 1997-09-26 | 2003-06-03 | Mci Communications Corporation | Integrated proxy interface for web based telecommunication toll-free network management using a network manager for downloading a call routing tree to client |
US6240414B1 (en) * | 1997-09-28 | 2001-05-29 | Eisolutions, Inc. | Method of resolving data conflicts in a shared data environment |
US6005571A (en) * | 1997-09-30 | 1999-12-21 | Softline, Inc. | Graphical user interface for managing security in a database system |
US6023684A (en) * | 1997-10-01 | 2000-02-08 | Security First Technologies, Inc. | Three tier financial transaction system with cache memory |
US6131120A (en) * | 1997-10-24 | 2000-10-10 | Directory Logic, Inc. | Enterprise network management directory containing network addresses of users and devices providing access lists to routers and servers |
US6014666A (en) * | 1997-10-28 | 2000-01-11 | Microsoft Corporation | Declarative and programmatic access control of component-based server applications using roles |
US6256739B1 (en) | 1997-10-30 | 2001-07-03 | Juno Online Services, Inc. | Method and apparatus to determine user identity and limit access to a communications network |
US6061799A (en) * | 1997-10-31 | 2000-05-09 | International Business Machines Corp. | Removable media for password based authentication in a distributed system |
US6098056A (en) * | 1997-11-24 | 2000-08-01 | International Business Machines Corporation | System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet |
US6092196A (en) * | 1997-11-25 | 2000-07-18 | Nortel Networks Limited | HTTP distributed remote user authentication system |
US6088679A (en) * | 1997-12-01 | 2000-07-11 | The United States Of America As Represented By The Secretary Of Commerce | Workflow management employing role-based access control |
US6208986B1 (en) | 1997-12-15 | 2001-03-27 | International Business Machines Corporation | Web interface and method for accessing and displaying directory information |
US6490574B1 (en) * | 1997-12-17 | 2002-12-03 | International Business Machines Corporation | Method and system for managing rules and events in a multi-user intelligent agent environment |
US6275916B1 (en) * | 1997-12-18 | 2001-08-14 | Alcatel Usa Sourcing, L.P. | Object oriented program memory management system and method using fixed sized memory pools |
US6052468A (en) * | 1998-01-15 | 2000-04-18 | Dew Engineering And Development Limited | Method of securing a cryptographic key |
US6076108A (en) * | 1998-03-06 | 2000-06-13 | I2 Technologies, Inc. | System and method for maintaining a state for a user session using a web system having a global session server |
US6618806B1 (en) * | 1998-04-01 | 2003-09-09 | Saflink Corporation | System and method for authenticating users in a computer network |
US6133916A (en) * | 1998-04-08 | 2000-10-17 | International Business Machines Corporation | Graphical user interface providing access to files downloaded over a network |
US6772350B1 (en) * | 1998-05-15 | 2004-08-03 | E.Piphany, Inc. | System and method for controlling access to resources in a distributed environment |
CA2357003C (en) * | 1998-05-21 | 2002-04-09 | Equifax Inc. | System and method for authentication of network users and issuing a digital certificate |
US6347374B1 (en) | 1998-06-05 | 2002-02-12 | Intrusion.Com, Inc. | Event detection |
US6338097B1 (en) | 1998-06-19 | 2002-01-08 | Sap Aktiengesellschaft | Cross application time sheet for communicating with one or more enterprise management applications during time data entry |
US6141778A (en) * | 1998-06-29 | 2000-10-31 | Mci Communications Corporation | Method and apparatus for automating security functions in a computer system |
US6282546B1 (en) | 1998-06-30 | 2001-08-28 | Cisco Technology, Inc. | System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment |
US6324656B1 (en) * | 1998-06-30 | 2001-11-27 | Cisco Technology, Inc. | System and method for rules-driven multi-phase network vulnerability assessment |
US6182142B1 (en) * | 1998-07-10 | 2001-01-30 | Encommerce, Inc. | Distributed access management of information resources |
US6178418B1 (en) * | 1998-07-28 | 2001-01-23 | Noetix Corporation | Distributed data warehouse query and resource management system |
US6205480B1 (en) * | 1998-08-19 | 2001-03-20 | Computer Associates Think, Inc. | System and method for web server user authentication |
US6185650B1 (en) | 1998-08-28 | 2001-02-06 | International Business Machines Corporation | High performance locking facility |
US6289462B1 (en) | 1998-09-28 | 2001-09-11 | Argus Systems Group, Inc. | Trusted compartmentalized computer operating system |
US6266420B1 (en) | 1998-10-08 | 2001-07-24 | Entrust Technologies Limited | Method and apparatus for secure group communications |
US6366913B1 (en) | 1998-10-21 | 2002-04-02 | Netscape Communications Corporation | Centralized directory services supporting dynamic group membership |
US6158010A (en) * | 1998-10-28 | 2000-12-05 | Crosslogix, Inc. | System and method for maintaining security in a distributed computer network |
US6385653B1 (en) * | 1998-11-02 | 2002-05-07 | Cisco Technology, Inc. | Responding to network access requests using a transparent media access and uniform delivery of service |
US6347312B1 (en) * | 1998-11-05 | 2002-02-12 | International Business Machines Corporation | Lightweight directory access protocol (LDAP) directory server cache mechanism and method |
US6985953B1 (en) * | 1998-11-30 | 2006-01-10 | George Mason University | System and apparatus for storage and transfer of secure data on web |
US6381579B1 (en) | 1998-12-23 | 2002-04-30 | International Business Machines Corporation | System and method to provide secure navigation to resources on the internet |
US6499107B1 (en) | 1998-12-29 | 2002-12-24 | Cisco Technology, Inc. | Method and system for adaptive network security using intelligent packet analysis |
US6301668B1 (en) | 1998-12-29 | 2001-10-09 | Cisco Technology, Inc. | Method and system for adaptive network security using network vulnerability assessment |
US6415321B1 (en) | 1998-12-29 | 2002-07-02 | Cisco Technology, Inc. | Domain mapping method and system |
US6578147B1 (en) | 1999-01-15 | 2003-06-10 | Cisco Technology, Inc. | Parallel intrusion detection sensors with load balancing for high speed networks |
US7111321B1 (en) * | 1999-01-25 | 2006-09-19 | Dell Products L.P. | Portable computer system with hierarchical and token-based security policies |
US6408360B1 (en) * | 1999-01-25 | 2002-06-18 | International Business Machines Corporation | Cache override control in an apparatus for caching dynamic content |
US6154741A (en) * | 1999-01-29 | 2000-11-28 | Feldman; Daniel J. | Entitlement management and access control system |
US6745221B1 (en) | 1999-03-01 | 2004-06-01 | Mitel, Inc. | Dynamic resource reallocation |
DE69934207T2 (en) * | 1999-03-08 | 2007-10-25 | Software Ag | Method for access checking of a user |
US6542993B1 (en) * | 1999-03-12 | 2003-04-01 | Lucent Technologies Inc. | Security management system and method |
US6609205B1 (en) | 1999-03-18 | 2003-08-19 | Cisco Technology, Inc. | Network intrusion detection signature analysis using decision graphs |
US6539382B1 (en) * | 1999-04-29 | 2003-03-25 | International Business Machines Corporation | Intelligent pre-caching algorithm for a directory server based on user data access history |
US7155737B1 (en) * | 1999-05-11 | 2006-12-26 | Entrust, Inc. | Integrating user specified extensions into an information access system |
US6442567B1 (en) | 1999-05-14 | 2002-08-27 | Appintec Corporation | Method and apparatus for improved contact and activity management and planning |
US7140039B1 (en) * | 1999-06-08 | 2006-11-21 | The Trustees Of Columbia University In The City Of New York | Identification of an attacker in an electronic system |
US6748540B1 (en) * | 1999-06-17 | 2004-06-08 | International Business Machines Corporation | Method and apparatus for detection and notification of unauthorized access attempts in a distributed data processing system |
US6526438B1 (en) | 1999-07-12 | 2003-02-25 | Divine, Inc. | Method for distributing information to subscribers over a network |
US6741992B1 (en) * | 1999-07-29 | 2004-05-25 | Xtenit | Flexible rule-based communication system and method for controlling the flow of and access to information between computer users |
US6691232B1 (en) | 1999-08-05 | 2004-02-10 | Sun Microsystems, Inc. | Security architecture with environment sensitive credential sufficiency evaluation |
US6539379B1 (en) | 1999-08-23 | 2003-03-25 | Oblix, Inc. | Method and apparatus for implementing a corporate directory and service center |
US6339423B1 (en) | 1999-08-23 | 2002-01-15 | Entrust, Inc. | Multi-domain access control |
US6968314B1 (en) * | 1999-12-22 | 2005-11-22 | International Business Machines Corporation | Enhanced security features for an automated order fulfillment system |
US6601169B2 (en) * | 1999-12-30 | 2003-07-29 | Clyde Riley Wallace, Jr. | Key-based secure network user states |
US6779120B1 (en) * | 2000-01-07 | 2004-08-17 | Securify, Inc. | Declarative language for specifying a security policy |
ATE414943T1 (en) | 2000-03-03 | 2008-12-15 | Ibm | SYSTEM FOR DETERMINING WEAKNESSES OF WEB APPLICATIONS |
US7231517B1 (en) * | 2000-03-03 | 2007-06-12 | Novell, Inc. | Apparatus and method for automatically authenticating a network client |
US7058947B1 (en) * | 2000-05-02 | 2006-06-06 | Microsoft Corporation | Resource manager architecture utilizing a policy manager |
US6985946B1 (en) * | 2000-05-12 | 2006-01-10 | Microsoft Corporation | Authentication and authorization pipeline architecture for use in a web server |
US7249369B2 (en) * | 2000-07-10 | 2007-07-24 | Oracle International Corporation | Post data processing |
US7464162B2 (en) * | 2000-07-10 | 2008-12-09 | Oracle International Corporation | Systems and methods for testing whether access to a resource is authorized based on access information |
US8661539B2 (en) * | 2000-07-10 | 2014-02-25 | Oracle International Corporation | Intrusion threat detection |
US7124203B2 (en) * | 2000-07-10 | 2006-10-17 | Oracle International Corporation | Selective cache flushing in identity and access management systems |
US7134137B2 (en) * | 2000-07-10 | 2006-11-07 | Oracle International Corporation | Providing data to applications from an access system |
US7194764B2 (en) * | 2000-07-10 | 2007-03-20 | Oracle International Corporation | User authentication |
US8204999B2 (en) * | 2000-07-10 | 2012-06-19 | Oracle International Corporation | Query string processing |
JP3983961B2 (en) | 2000-07-18 | 2007-09-26 | 株式会社東芝 | Directory information management apparatus and computer-readable recording medium recording program |
US7137008B1 (en) * | 2000-07-25 | 2006-11-14 | Laurence Hamid | Flexible method of user authentication |
US7017041B2 (en) * | 2000-12-19 | 2006-03-21 | Tricipher, Inc. | Secure communications network with user control of authenticated personal information provided to network entities |
US7185364B2 (en) * | 2001-03-21 | 2007-02-27 | Oracle International Corporation | Access system interface |
US7231661B1 (en) * | 2001-06-21 | 2007-06-12 | Oracle International Corporation | Authorization services with external authentication |
US8768715B2 (en) | 2001-12-13 | 2014-07-01 | Oracle America, Inc. | System and method for resource management |
US6678828B1 (en) | 2002-07-22 | 2004-01-13 | Vormetric, Inc. | Secure network file access control system |
-
2001
- 2001-02-26 US US09/792,915 patent/US9038170B2/en active Active
- 2001-07-09 WO PCT/US2001/021590 patent/WO2002005487A1/en active Application Filing
- 2001-07-09 AU AU2001271927A patent/AU2001271927A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
WO2002005487A1 (en) | 2002-01-17 |
US20020116642A1 (en) | 2002-08-22 |
US9038170B2 (en) | 2015-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2001271927A1 (en) | A system for logging access system events and providing identity management and access management for a network | |
AU2001257400A1 (en) | System and method for managing security events on a network | |
AU2002225804A1 (en) | Methods and systems for providing employment management services over a network | |
AU2001257374A1 (en) | Network management method and system | |
AU2000270865A1 (en) | Distributed network management system and method | |
AU2001271350A1 (en) | Method and system for providing intelligent network management | |
AU5448500A (en) | Network element management system | |
GB2357615B (en) | Access right management system and gateway | |
AU5129000A (en) | Method and system for network management | |
AU2001277176A1 (en) | System for distributed network authentication and access control | |
AU1748797A (en) | Key management for network communication | |
AU2001245292A1 (en) | Network access security | |
AU1331500A (en) | Maintaining security in a distributed computer network | |
AU5318900A (en) | Network management | |
AU2000257424A1 (en) | Software, systems and methods for managing a distributed network | |
AU2001284620A1 (en) | Order-handling inventory management system and method | |
AU3871700A (en) | Distributed database management system | |
AU2001243436A1 (en) | Fax-through data network and remote access system | |
AU2001275387A1 (en) | Event revenue management system | |
AU2567901A (en) | Centralized information management | |
AU6752800A (en) | Access management system and method employing secure credentials | |
AU4311101A (en) | Decoupling access control from key management in a network | |
AU2001256370A1 (en) | Remote control system for access management and control | |
AU4507901A (en) | Ip library management system | |
AU2001226383A1 (en) | System and method for managing network access |