US Patent No: 6,035,399

Number of patents in Portfolio can not be more than 2000

Checkpoint object

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

An object oriented tool monitors the step-by-step progress of security administration within an electronic work flow to implement access control measures, and security administration policies that may include additional checks and balances, such as second party review, escalated authorization requirements, and trusted audit facilities. A security administration architecture for distributed electronic data processing systems preferably includes a checkpoint object that provides uniform characterization of milestone or transition states in administration activity, and which may be inherited by or refined to an administration activity object. A checkpoint object manager that is instantiated as a trusted third party object manages the state progression of checkpoint objects. As a result of checkpointing, checkpoint objects are resumed with their state advanced, reversed, or unchanged by the checkpoint object manager as appropriate. The checkpoint object manager also assures that all checkpoints are logged and monitored, and that resumptions are authenticated.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPHOUSTON, TX9467

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Anderson, Anne H Acton, MA 14 446
Carpenter, Gregory P Medford, MA 3 37
Crall, Christopher J Los Altos, CA 5 56
Klemba, Keith S Santa Clara, CA 8 192
Palmer, Thomas A San Carlos, CA 1 31
Pato, Joseph N Arlington, MA 3 62

Cited Art Landscape

Patent Info (Count) # Cites Year
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (2)
* 5,032,979 Distributed security auditing subsystem for an operating system 353 1990
* 5,539,906 Method and apparatus for controlling access to data elements in a data processing system based on status of an industrial process 43 1995
 
Other [Check patent profile for assignment information] (1)
* 4,455,093 Timer mechanism for rental equipment 6 1982
 
HEWLETT-PACKARD COMPANY (1)
* 5,133,075 Method of monitoring changes in attribute values of object in an object-oriented database 372 1988
 
MICROSOFT TECHNOLOGY LICENSING, LLC (1)
* 5,764,890 Method and system for adding a secure network server to an existing computer network 213 1997
 
MNAP TECHNOLOGIES INTERNATIONAL, INC. (1)
* 5,483,649 Personal computer security system 84 1994
 
Hewlett-Packard Laboratories (1)
* 5,802,542 Information management system for a dynamic system and method thereof 12 1995
 
FIRESTAR SOFTWARE, INC. (1)
* 5,542,078 Object oriented data store integration environment for integration of object oriented databases and non-object oriented data facilities 177 1994
 
Rocket Software, Inc. (1)
* 5,305,456 Apparatus and method for computer system integrated security 48 1991
 
CONTEL FEDERAL SYSTEMS, INC., A DE CORP. (1)
* 4,503,499 Controlled work flow system 196 1982
 
ORACLE AMERICA, INC. (1)
* 5,680,461 Secure network protocol system and method 86 1995
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (9)
6,446,069 Access control system for a multimedia datastore 26 1999
* 7,472,190 Method, system and program product for preserving a user state in an application 4 2003
* 2005/0086,323 Method, system and program product for preserving a user state in an application 0 2003
8,725,521 System and method for designing secure business solutions using patterns 0 2004
* 2006/0036,479 System and method for designing secure solutions using patterns 9 2004
* 7,493,347 Method for condensing reported checkpoint log data 1 2005
* 2006/0277,162 Apparatus, system, and method for condensing reported checkpoint log data 2 2005
* 2009/0012,987 METHOD AND SYSTEM FOR DELIVERING ROLE-APPROPRIATE POLICIES 5 2007
7,953,874 System and program product for preserving a user state in an application 0 2008
 
Other [Check patent profile for assignment information] (1)
* 2007/0006,294 Secure flow control for a data flow in a computer and data flow in a computer network 17 2005
 
SAP SE (2)
* 6,470,353 Object-oriented framework for managing access control in a multimedia database 23 1999
* 2010/0218,082 METHOD AND SYSTEM FOR EXPRESSING AND ENFORCING NON-FUNCTIONAL CONCERNS IN BUSINESS PROCESS MANAGEMENT SYSTEMS AND WORKFLOW SYSTEMS 1 2009
 
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP (2)
* 7,236,939 Peer-to-peer inter-enterprise collaborative process management method and system 7 2001
* 2002/0184,070 Inter-enterprise collaborative process management method and system 77 2001
 
AOL LLC (1)
* 2004/0103,317 Method and apparatus for protecting secure credentials on an untrusted computer platform 30 2003
 
MITEL NETWORKS CORPORATION (1)
6,928,553 Providing internet protocol (IP) security 25 2001
 
Teradata US, Inc. (1)
* 7,689,863 Restartable database loads using parallel data streams 4 2004
 
SERVICENOW, INC. (1)
* 7,035,895 Manager object for management of multiple resources on dataless clients in a distributed computing environment 3 1998
 
ORACLE INTERNATIONAL CORPORATION (17)
* 6,158,010 System and method for maintaining security in a distributed computer network 382 1999
7,506,357 System and method for maintaining security in a distributed computer network 8 2000
6,941,472 System and method for maintaining security in a distributed computer network 77 2001
* 2001/0007,133 System and method for maintaining security in a distributed computer network 20 2001
7,673,323 System and method for maintaining security in a distributed computer network 28 2001
7,363,650 System and method for incrementally distributing a security policy in a computer network 28 2002
7,350,226 System and method for analyzing security policies in a distributed computer network 44 2002
* 2003/0115,484 System and method for incrementally distributing a security policy in a computer network 21 2002
* 7,966,493 Method of and system for determining if an electronic signature is necessary in order to commit a transaction to a database 2 2003
7,644,432 Policy inheritance through nested groups 34 2004
7,603,547 Security control module 42 2004
7,603,548 Security provider development model 43 2004
7,594,112 Delegated administration for a distributed security system 13 2004
7,594,224 Distributed enterprise security system 54 2004
* 2005/0097,350 Security control module 7 2004
* 2005/0097,351 Security provider development model 2 2004
7,318,237 System and method for maintaining security in a distributed computer network 112 2005
 
INTEL CORPORATION (1)
9,235,707 Methods and arrangements to launch trusted, coexisting environments 0 2013
 
MICROSOFT TECHNOLOGY LICENSING, LLC (4)
* 2011/0035,802 REPRESENTING VIRTUAL OBJECT PRIORITY BASED ON RELATIONSHIPS 8 2009
* 8,224,780 Checkpoints for a file system 3 2010
* 2011/0307,449 CHECKPOINTS FOR A FILE SYSTEM 4 2010
8,924,356 Checkpoints for a file system 0 2012
 
Anthurium Solutions, Inc. (5)
8,954,499 Systems and methods for managing workflow based on dynamic modification of job processing requirements 0 2004
8,903,901 Systems and methods for managing workflow based on analysis of worker selection criteria 0 2004
8,700,694 Systems and methods for managing workflow based on multi-level specification of job processing requirements 0 2004
* 2005/0195,428 Systems and methods for managing workflow based on analysis of worker selection criteria 3 2004
* 2005/0134,912 Systems and methods for managing workflow based on dynamic tracking of job steps 1 2004
 
MCAFEE, INC. (2)
* 7,308,702 Locally adaptable central security management in a heterogeneous network environment 77 2000
8,181,222 Locally adaptable central security management in a heterogeneous network environment 10 2007
 
BEA SYSTEMS, INC. (1)
* 2005/0257,245 Distributed security system with dynamic roles 13 2004
* Cited By Examiner