DK3188069T3 - Netværksbaseret tilladelsessystem - Google Patents

Netværksbaseret tilladelsessystem Download PDF

Info

Publication number
DK3188069T3
DK3188069T3 DK16207027.0T DK16207027T DK3188069T3 DK 3188069 T3 DK3188069 T3 DK 3188069T3 DK 16207027 T DK16207027 T DK 16207027T DK 3188069 T3 DK3188069 T3 DK 3188069T3
Authority
DK
Denmark
Prior art keywords
network
authorization system
based authorization
authorization
Prior art date
Application number
DK16207027.0T
Other languages
English (en)
Inventor
Mark Elliot
Jason Zhao
Brian Schimpf
Jacob Meacham
Marco Gelmi
Benjamin Duffield
Savino Sguera
James Baker
Neil Rickards
Javier Campanini
Qinfeng Chen
Derek Cicerone
Nathan Ziebart
Original Assignee
Palantir Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Palantir Technologies Inc filed Critical Palantir Technologies Inc
Application granted granted Critical
Publication of DK3188069T3 publication Critical patent/DK3188069T3/da

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/121Timestamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
DK16207027.0T 2015-12-28 2016-12-27 Netværksbaseret tilladelsessystem DK3188069T3 (da)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201562272003P 2015-12-28 2015-12-28
US15/204,866 US9888039B2 (en) 2015-12-28 2016-07-07 Network-based permissioning system

Publications (1)

Publication Number Publication Date
DK3188069T3 true DK3188069T3 (da) 2020-05-18

Family

ID=57821772

Family Applications (1)

Application Number Title Priority Date Filing Date
DK16207027.0T DK3188069T3 (da) 2015-12-28 2016-12-27 Netværksbaseret tilladelsessystem

Country Status (6)

Country Link
US (3) US9888039B2 (da)
EP (2) EP3188069B1 (da)
DK (1) DK3188069T3 (da)
ES (1) ES2794407T3 (da)
LT (1) LT3188069T (da)
PT (1) PT3188069T (da)

Families Citing this family (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11817939B2 (en) 2012-03-31 2023-11-14 Intel Corporation Proximate communication with a target device
WO2013147910A1 (en) 2012-03-31 2013-10-03 Intel Corporation Proximate communication with a target device
US9667360B2 (en) * 2012-03-31 2017-05-30 Intel Corporation Proximate communication with a target device
US11038896B2 (en) * 2015-06-02 2021-06-15 Dipankar Dasgupta Adaptive multi-factor authentication system with multi-user permission strategy to access sensitive information
US9888039B2 (en) 2015-12-28 2018-02-06 Palantir Technologies Inc. Network-based permissioning system
US11086640B2 (en) 2015-12-30 2021-08-10 Palantir Technologies Inc. Composite graphical interface with shareable data-objects
US11055439B2 (en) * 2016-01-25 2021-07-06 Micro Focus Llc Confirmation message determinations
US10827036B2 (en) * 2016-09-19 2020-11-03 Palantir Technologies Inc. Version control machine
US10135874B1 (en) * 2016-11-16 2018-11-20 VCE IP Holding Company LLC Compliance management system and method for an integrated computing system
US11250075B1 (en) * 2017-02-17 2022-02-15 Snap Inc. Searching social media content
US10027551B1 (en) 2017-06-29 2018-07-17 Palantir Technologies, Inc. Access controls through node-based effective policy identifiers
GB201716170D0 (en) 2017-10-04 2017-11-15 Palantir Technologies Inc Controlling user creation of data resources on a data processing platform
US10142349B1 (en) 2018-02-22 2018-11-27 Palantir Technologies Inc. Verifying network-based permissioning rights
GB201722042D0 (en) * 2017-12-28 2018-02-14 Palantir Technologies Inc Verifying Network-Based permissioning Rights
CN108173859A (zh) * 2017-12-29 2018-06-15 北京星河星云信息技术有限公司 文件共享的方法和系统
EP4290400A3 (en) 2018-04-03 2024-03-06 Palantir Technologies Inc. Controlling access to computer resources
US11244063B2 (en) 2018-06-11 2022-02-08 Palantir Technologies Inc. Row-level and column-level policy service
GB201813951D0 (en) * 2018-08-28 2018-10-10 Palantir Technologies Inc Data storage method and system
US11363028B2 (en) * 2018-09-27 2022-06-14 The Toronto-Dominion Bank Systems and methods for delegating access to a protected resource
US11157643B2 (en) 2018-09-27 2021-10-26 The Toronto-Dominion Bank Systems and methods for delegating access to a protected resource
US11134085B2 (en) * 2018-10-08 2021-09-28 Sonrai Security Inc. Cloud least identity privilege and data access framework
EP3690689A1 (de) * 2019-01-29 2020-08-05 Siemens Aktiengesellschaft System und verfahren zum sicheren ausführen von anwendungsprogrammen
EP3694173B1 (en) 2019-02-08 2022-09-21 Palantir Technologies Inc. Isolating applications associated with multiple tenants within a computing platform
US11048808B2 (en) * 2019-04-28 2021-06-29 International Business Machines Corporation Consent for common personal information
CN112438040A (zh) * 2019-07-01 2021-03-02 思杰系统有限公司 用于使用命名空间访问计算资源的系统和方法
US11704441B2 (en) 2019-09-03 2023-07-18 Palantir Technologies Inc. Charter-based access controls for managing computer resources
US10761889B1 (en) 2019-09-18 2020-09-01 Palantir Technologies Inc. Systems and methods for autoscaling instance groups of computing platforms
US11914623B2 (en) 2019-10-24 2024-02-27 Palantir Technologies Inc. Approaches for managing access control permissions
US11263336B2 (en) 2019-10-29 2022-03-01 Palantir Technologies Inc. Systems and methods for providing network-based permissioning using security node hash identifiers
CN111339560B (zh) * 2020-02-26 2023-06-13 中国邮政储蓄银行股份有限公司 一种数据隔离方法、装置及系统
CN111488172B (zh) * 2020-03-11 2023-12-26 中移(杭州)信息技术有限公司 一种权限控制方法、装置和可读存储介质
US10917401B1 (en) * 2020-03-24 2021-02-09 Imperva, Inc. Data leakage prevention over application programming interface
US11336527B2 (en) * 2020-06-01 2022-05-17 Hewlett Packard Enterprise Development Lp Method and system for enhanced command management in a network
US11943616B2 (en) 2020-11-13 2024-03-26 Oracle International Corporation Methods, systems, and computer readable media for utilizing network function identifiers to implement ingress message rate limiting
US11895501B2 (en) 2020-12-08 2024-02-06 Oracle International Corporation Methods, systems, and computer readable media for automatic key management of network function (NF) repository function (NRF) access token public keys for 5G core (5GC) authorization to mitigate security attacks
CN112511569B (zh) * 2021-02-07 2021-05-11 杭州筋斗腾云科技有限公司 网络资源访问请求的处理方法、系统及计算机设备
US11553524B2 (en) * 2021-03-04 2023-01-10 Oracle International Corporation Methods, systems, and computer readable media for resource object level authorization at a network function (NF)
US20220407861A1 (en) * 2021-06-18 2022-12-22 ALTR Solutions, Inc. Security driver external functions
CN114430395A (zh) * 2022-03-02 2022-05-03 阿波罗智联(北京)科技有限公司 流量控制方法、装置、设备以及智能交通管理设备
CN114884668A (zh) * 2022-03-17 2022-08-09 阿里巴巴(中国)有限公司 资源管理方法及计算机可读存储介质

Family Cites Families (124)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7526435B1 (en) * 1997-01-07 2009-04-28 Fujitsu Limited Information offering system automating registration of advertisement information on home pages
US5978475A (en) 1997-07-18 1999-11-02 Counterpane Internet Security, Inc. Event auditing system
US7047415B2 (en) 1997-09-22 2006-05-16 Dfs Linkages, Inc. System and method for widely witnessed proof of time
US7017046B2 (en) 1997-09-22 2006-03-21 Proofspace, Inc. System and method for graphical indicia for the certification of records
US6158010A (en) 1998-10-28 2000-12-05 Crosslogix, Inc. System and method for maintaining security in a distributed computer network
US7069586B1 (en) 2000-04-03 2006-06-27 Software Secure, Inc. Securely executing an application on a computer system
US7512965B1 (en) * 2000-04-19 2009-03-31 Hewlett-Packard Development Company, L.P. Computer system security service
US7350204B2 (en) 2000-07-24 2008-03-25 Microsoft Corporation Policies for secure software execution
US6725240B1 (en) 2000-08-08 2004-04-20 International Business Machines Corporation Apparatus and method for protecting against data tampering in an audit subsystem
US6807569B1 (en) 2000-09-12 2004-10-19 Science Applications International Corporation Trusted and anonymous system and method for sharing threat data to industry assets
US6957261B2 (en) * 2001-07-17 2005-10-18 Intel Corporation Resource policy management using a centralized policy data structure
JP2005532606A (ja) 2001-12-31 2005-10-27 シタデル セキュリティ ソフトウェア インコーポレイテッド コンピュータの脆弱性を解決する自動化されたシステム
US20030172291A1 (en) 2002-03-08 2003-09-11 Paul Judge Systems and methods for automated whitelisting in monitored communications
GB0207354D0 (en) * 2002-03-28 2002-05-08 Ibm Inheritance of access controls within a hierarchy of data processing system resources
US6950825B2 (en) * 2002-05-30 2005-09-27 International Business Machines Corporation Fine grained role-based access to system resources
US7428592B2 (en) * 2002-07-11 2008-09-23 Oracle International Corporation Securely persisting network resource identifiers
US20040123139A1 (en) 2002-12-18 2004-06-24 At&T Corp. System having filtering/monitoring of secure connections
US20040153418A1 (en) 2003-02-05 2004-08-05 Hanweck Gerald Alfred System and method for providing access to data from proprietary tools
JP4393774B2 (ja) * 2003-02-28 2010-01-06 株式会社日立製作所 ジョブ管理方法、情報処理システム、プログラム、及び記録媒体
US7886236B2 (en) 2003-03-28 2011-02-08 Microsoft Corporation Dynamic feedback for gestures
US7681235B2 (en) 2003-05-19 2010-03-16 Radware Ltd. Dynamic network protection
US8065725B2 (en) 2003-05-30 2011-11-22 Yuliang Zheng Systems and methods for enhanced network security
WO2005010686A2 (en) 2003-07-18 2005-02-03 Corestreet, Ltd. Disseminating additional data used for controlling access
US8190893B2 (en) 2003-10-27 2012-05-29 Jp Morgan Chase Bank Portable security transaction protocol
US20050157662A1 (en) 2004-01-20 2005-07-21 Justin Bingham Systems and methods for detecting a compromised network
US7596285B2 (en) 2004-02-26 2009-09-29 International Business Machines Corporation Providing a portion of an electronic mail message at a reduced resolution
EP1759258A1 (en) 2004-04-06 2007-03-07 Telecom Italia S.p.A. Secure logging for irrefutable administration
US7225468B2 (en) 2004-05-07 2007-05-29 Digital Security Networks, Llc Methods and apparatus for computer network security using intrusion detection and prevention
US20060031928A1 (en) 2004-08-09 2006-02-09 Conley James W Detector and computerized method for determining an occurrence of tunneling activity
CA2600344A1 (en) 2005-03-02 2006-09-08 Markmonitor Inc. Distribution of trust data
US8646080B2 (en) 2005-09-16 2014-02-04 Avg Technologies Cy Limited Method and apparatus for removing harmful software
US7676845B2 (en) 2005-03-24 2010-03-09 Microsoft Corporation System and method of selectively scanning a file on a computing device for malware
FR2883997A1 (fr) * 2005-04-04 2006-10-06 France Telecom Procede de gestion de decisions, procede de construction d'un arbre de decision, gestionnaire central, gestionnaire intermediaire, terminal et produits programmes d'ordinateur correspondants
US20060232826A1 (en) * 2005-04-13 2006-10-19 Hagai Bar-El Method, device, and system of selectively accessing data
JP2009506405A (ja) 2005-08-09 2009-02-12 ネクサン テクノロジーズ カナダ インコーポレイテッド データアーカイブシステム
US20070143851A1 (en) 2005-12-21 2007-06-21 Fiberlink Method and systems for controlling access to computing resources based on known security vulnerabilities
US7412448B2 (en) * 2006-05-17 2008-08-12 International Business Machines Corporation Performance degradation root cause prediction in a distributed computing system
US7891003B2 (en) 2006-06-14 2011-02-15 Microsoft Corporation Enterprise threat modeling
WO2008000191A1 (fr) * 2006-06-23 2008-01-03 Tencent Technology (Shenzhen) Company Limited Procédé, système et client d'annonce publicitaire diffusée
US8943332B2 (en) 2006-10-31 2015-01-27 Hewlett-Packard Development Company, L.P. Audit-log integrity using redactable signatures
US7962495B2 (en) 2006-11-20 2011-06-14 Palantir Technologies, Inc. Creating data in a data store using a dynamic ontology
US8196184B2 (en) 2007-02-16 2012-06-05 Microsoft Corporation Efficient data structures for multi-dimensional security
US8006094B2 (en) 2007-02-21 2011-08-23 Ricoh Co., Ltd. Trustworthy timestamps and certifiable clocks using logs linked by cryptographic hashes
US20080222706A1 (en) 2007-03-06 2008-09-11 Martin Renaud Globally aware authentication system
US8959568B2 (en) 2007-03-14 2015-02-17 Microsoft Corporation Enterprise security assessment sharing
US8312546B2 (en) 2007-04-23 2012-11-13 Mcafee, Inc. Systems, apparatus, and methods for detecting malware
US20120084866A1 (en) 2007-06-12 2012-04-05 Stolfo Salvatore J Methods, systems, and media for measuring computer security
US8245271B2 (en) 2007-08-15 2012-08-14 Oracle International Corporation Scope-centric access control model
FR2921779B1 (fr) 2007-09-28 2011-02-18 Alcatel Lucent Communication d'une information de risque dans un reseau multi-domaine
TWI366114B (en) 2008-03-04 2012-06-11 Ind Tech Res Inst Record system and method based on one-way hash function
JP5202067B2 (ja) * 2008-03-27 2013-06-05 キヤノン株式会社 情報処理装置、情報処理方法、記憶媒体及びプログラム
US8166071B1 (en) 2008-05-22 2012-04-24 Informatica Corporation System and method for efficiently securing enterprise data resources
ES2960087T3 (es) 2008-05-22 2024-02-29 Hampidjan Hf Cable de sonar de cabecera mejorado
US8141129B2 (en) * 2008-05-29 2012-03-20 Microsoft Corporation Centrally accessible policy repository
US8301904B1 (en) 2008-06-24 2012-10-30 Mcafee, Inc. System, method, and computer program product for automatically identifying potentially unwanted data as unwanted
US8689335B2 (en) 2008-06-25 2014-04-01 Microsoft Corporation Mapping between users and machines in an enterprise security assessment sharing system
US20110113471A1 (en) * 2008-07-10 2011-05-12 Telefonaktiebolaget L M Ericsson (Publ) Method and apparatus for context-based content management
US8387110B1 (en) 2010-02-10 2013-02-26 Socialware, Inc. Method, system and computer program product for tagging content on uncontrolled web application
US8667583B2 (en) 2008-09-22 2014-03-04 Microsoft Corporation Collecting and analyzing malware data
US8108933B2 (en) 2008-10-21 2012-01-31 Lookout, Inc. System and method for attack and malware prevention
US20100262688A1 (en) 2009-01-21 2010-10-14 Daniar Hussain Systems, methods, and devices for detecting security vulnerabilities in ip networks
US9400891B2 (en) * 2009-01-23 2016-07-26 Randall Stephens Owner controlled transmitted file protection and access control system and method
US20100235915A1 (en) 2009-03-12 2010-09-16 Nasir Memon Using host symptoms, host roles, and/or host reputation for detection of host infection
CN101729531B (zh) 2009-03-16 2016-04-13 中兴通讯股份有限公司 网络安全策略分发方法、装置及系统
US8239668B1 (en) 2009-04-15 2012-08-07 Trend Micro Incorporated Computer security threat data collection and aggregation with user privacy protection
KR101076887B1 (ko) 2009-06-26 2011-10-25 주식회사 하이닉스반도체 반도체 메모리소자의 랜딩플러그 형성방법
US8589694B2 (en) * 2009-07-31 2013-11-19 International Business Machines Corporation System, method, and apparatus for graduated difficulty of human response tests
US8560854B2 (en) 2009-09-08 2013-10-15 Ricoh Co., Ltd. Device enabled verifiable stroke and image based workflows
US9049117B1 (en) 2009-10-21 2015-06-02 Narus, Inc. System and method for collecting and processing information of an internet user via IP-web correlation
WO2011063269A1 (en) 2009-11-20 2011-05-26 Alert Enterprise, Inc. Method and apparatus for risk visualization and remediation
US20110202555A1 (en) 2010-01-28 2011-08-18 IT.COM, Inc. Graphical User Interfaces Supporting Method And System For Electronic Discovery Using Social Network Analysis
US8863279B2 (en) 2010-03-08 2014-10-14 Raytheon Company System and method for malware detection
US8782794B2 (en) 2010-04-16 2014-07-15 Bank Of America Corporation Detecting secure or encrypted tunneling in a computer network
US9215548B2 (en) 2010-09-22 2015-12-15 Ncc Group Security Services, Inc. Methods and systems for rating privacy risk of applications for smart phones and other mobile platforms
AU2011305214B2 (en) 2010-09-24 2014-12-11 Verisign, Inc. IP prioritization and scoring system for DDoS detection and mitigation
US8438473B2 (en) 2011-01-05 2013-05-07 Research In Motion Limited Handling of touch events in a browser environment
US9645986B2 (en) 2011-02-24 2017-05-09 Google Inc. Method, medium, and system for creating an electronic book with an umbrella policy
US9449010B2 (en) 2011-04-02 2016-09-20 Open Invention Network, Llc System and method for managing sensitive data using intelligent mobile agents on a network
US20150229664A1 (en) 2014-02-13 2015-08-13 Trevor Tyler HAWTHORN Assessing security risks of users in a computing network
RU2477929C2 (ru) 2011-04-19 2013-03-20 Закрытое акционерное общество "Лаборатория Касперского" Система и способ предотвращения инцидентов безопасности на основании рейтингов опасности пользователей
WO2012154657A2 (en) 2011-05-06 2012-11-15 The Penn State Research Foundation Robust anomaly detection and regularized domain adaptation of classifiers with application to internet packet-flows
US8640246B2 (en) 2011-06-27 2014-01-28 Raytheon Company Distributed malware detection
US8584242B2 (en) 2011-07-12 2013-11-12 At&T Intellectual Property I, L.P. Remote-assisted malware detection
US8726379B1 (en) 2011-07-15 2014-05-13 Norse Corporation Systems and methods for dynamic protection from electronic attacks
US9058486B2 (en) 2011-10-18 2015-06-16 Mcafee, Inc. User behavioral risk assessment
KR101575282B1 (ko) 2011-11-28 2015-12-09 한국전자통신연구원 보안관리 도메인들 간에 익명 식별자 기반의 보안정보를 공유하기 위한 에이전트 장치 및 방법
US9195777B2 (en) 2012-03-07 2015-11-24 Avira B.V. System, method and computer program product for normalizing data obtained from a plurality of social networks
US9275227B2 (en) * 2012-04-05 2016-03-01 International Business Machines Corporation Policy driven administration of mobile applications
US8931043B2 (en) 2012-04-10 2015-01-06 Mcafee Inc. System and method for determining and using local reputations of users and hosts to protect information in a network environment
US8925082B2 (en) 2012-08-22 2014-12-30 International Business Machines Corporation Cooperative intrusion detection ecosystem for IP reputation-based security
CN103686684A (zh) * 2012-09-20 2014-03-26 腾讯科技(深圳)有限公司 离线缓存的方法及装置
US9081975B2 (en) 2012-10-22 2015-07-14 Palantir Technologies, Inc. Sharing information between nexuses that use different classification schemes for information access control
US8914886B2 (en) 2012-10-29 2014-12-16 Mcafee, Inc. Dynamic quarantining for malware detection
US20140143009A1 (en) 2012-11-16 2014-05-22 International Business Machines Corporation Risk reward estimation for company-country pairs
US8881259B2 (en) 2012-12-18 2014-11-04 Verizon Patent And Licensing Inc. Network security system with customizable rule-based analytics engine for identifying application layer violations
US9323935B2 (en) 2012-12-18 2016-04-26 Mcafee, Inc. User device security profile
US9659085B2 (en) 2012-12-28 2017-05-23 Microsoft Technology Licensing, Llc Detecting anomalies in behavioral network with contextual side information
US9430116B2 (en) * 2013-02-12 2016-08-30 International Business Machines Corporation Visualization of runtime resource policy attachments and applied policy details
US9258198B2 (en) 2013-02-12 2016-02-09 International Business Machines Corporation Dynamic generation of policy enforcement rules and actions from policy attachment semantics
US10339157B2 (en) 2013-02-13 2019-07-02 Facebook, Inc. Hive table links
US20160072842A1 (en) * 2013-03-18 2016-03-10 Gary S. Greenbaum Maintaining rule coherency for applications
US9111104B2 (en) 2013-03-29 2015-08-18 Jive Software, Inc. Entitlements determination via access control lists
CN103281301B (zh) 2013-04-28 2017-02-08 上海海事大学 云安全恶意程序判断系统及方法
US9589043B2 (en) 2013-08-01 2017-03-07 Actiance, Inc. Unified context-aware content archive system
US9335897B2 (en) 2013-08-08 2016-05-10 Palantir Technologies Inc. Long click display of a context menu
US9392007B2 (en) 2013-11-04 2016-07-12 Crypteia Networks S.A. System and method for identifying infected networks and systems from unknown attacks
US9338013B2 (en) 2013-12-30 2016-05-10 Palantir Technologies Inc. Verifiable redactable audit log
US8832832B1 (en) 2014-01-03 2014-09-09 Palantir Technologies Inc. IP reputation
US20150199535A1 (en) 2014-01-13 2015-07-16 Oracle International Corporation Organization-based policies
US20150199625A1 (en) 2014-01-13 2015-07-16 Oracle International Corporation Logical and physical organization management
US20150248563A1 (en) 2014-03-03 2015-09-03 International Business Machines Corporation Requesting instant messaging history by validated parties
US9860252B2 (en) 2014-03-25 2018-01-02 Open Text Sa Ulc System and method for maintenance of transitive closure of a graph and user authentication
US9762603B2 (en) 2014-05-10 2017-09-12 Informatica Llc Assessment type-variable enterprise security impact analysis
US9021260B1 (en) 2014-07-03 2015-04-28 Palantir Technologies Inc. Malware data item analysis
US9785773B2 (en) 2014-07-03 2017-10-10 Palantir Technologies Inc. Malware data item analysis
US9419992B2 (en) 2014-08-13 2016-08-16 Palantir Technologies Inc. Unwanted tunneling alert system
US11281667B2 (en) 2015-01-08 2022-03-22 Microsoft Technology Licensing, Llc Distributed storage and distributed processing policy enforcement utilizing virtual identifiers
US10630686B2 (en) 2015-03-12 2020-04-21 Fornetix Llc Systems and methods for organizing devices in a policy hierarchy
US9888039B2 (en) 2015-12-28 2018-02-06 Palantir Technologies Inc. Network-based permissioning system
US10880281B2 (en) 2016-02-26 2020-12-29 Fornetix Llc Structure of policies for evaluating key attributes of encryption keys
US10860086B2 (en) 2016-02-26 2020-12-08 Fornetix Llc Policy-enabled encryption keys having complex logical operations
US10917239B2 (en) 2016-02-26 2021-02-09 Fornetix Llc Policy-enabled encryption keys having ephemeral policies
US11063980B2 (en) 2016-02-26 2021-07-13 Fornetix Llc System and method for associating encryption key management policy with device activity
US10027551B1 (en) 2017-06-29 2018-07-17 Palantir Technologies, Inc. Access controls through node-based effective policy identifiers

Also Published As

Publication number Publication date
US20190289036A1 (en) 2019-09-19
EP3678040B1 (en) 2021-12-01
US11431753B2 (en) 2022-08-30
US20170359379A1 (en) 2017-12-14
EP3188069A1 (en) 2017-07-05
EP3188069B1 (en) 2020-03-04
EP3678040A1 (en) 2020-07-08
PT3188069T (pt) 2020-04-27
US9888039B2 (en) 2018-02-06
US10362064B1 (en) 2019-07-23
ES2794407T3 (es) 2020-11-18
LT3188069T (lt) 2020-06-25

Similar Documents

Publication Publication Date Title
DK3188069T3 (da) Netværksbaseret tilladelsessystem
DK3618342T3 (da) Multi-underbærebølgesystem med flere numerologier
DK3356633T3 (da) Taper-loc-systemforbedringer
DK3330593T3 (da) Halo-lysenhed
DK3350463T3 (da) Drejeleje
DK3371315T3 (da) Phagemidvektor
FI20155670A (fi) Lukkorunko
DK3309440T3 (da) Sikkerhedssystem
FI11301U1 (fi) Turvajärjestelmä
DK3161247T3 (da) Brøndsystem
DK3272129T3 (da) Kommunikationssystem
DE112015005960T8 (de) Fahrzeugsteuersystem
DK3432103T3 (da) Indretningsstyringssystem
DK3234271T3 (da) Gelændersystem
DK3339109T3 (da) Låseenhed.
ES1138645Y (es) Pieza enroscada
DK3482136T3 (da) Varmesystem
DK3307482T3 (da) Indeslutningssystem
FI20155295A (fi) Lukkorunko
DK3468341T3 (da) Tildækningssystem
DK3112563T3 (da) Lås
FR3025742B1 (fr) Element de securite
DE112016002291A5 (de) Gurtretter-System
FI11541U1 (fi) Ajoneuvonpesulaitteisto
BR112018002277A2 (pt) Motor