US Patent No: 6,035,399

Number of patents in Portfolio can not be more than 2000

Checkpoint object

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

An object oriented tool monitors the step-by-step progress of security administration within an electronic work flow to implement access control measures, and security administration policies that may include additional checks and balances, such as second party review, escalated authorization requirements, and trusted audit facilities. A security administration architecture for distributed electronic data processing systems preferably includes a checkpoint object that provides uniform characterization of milestone or transition states in administration activity, and which may be inherited by or refined to an administration activity object. A checkpoint object manager that is instantiated as a trusted third party object manages the state progression of checkpoint objects. As a result of checkpointing, checkpoint objects are resumed with their state advanced, reversed, or unchanged by the checkpoint object manager as appropriate. The checkpoint object manager also assures that all checkpoints are logged and monitored, and that resumptions are authenticated.

Loading the Abstract Image... loading....

First Claim

See full text

all claims..

Related Publications

Loading Related Publications... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.HOUSTON, TX27375

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Anderson, Anne H Acton, MA 18 293
Carpenter, Gregory P Medford, MA 3 29
Crall, Christopher J Seattle, WA 8 42
Klemba, Keith S Santa Clara, CA 13 149
Palmer, Thomas A San Carlos, CA 1 27
Pato, Joseph N Arlington, MA 3 57

Cited Art Landscape

Patent Info (Count) # Cites Year
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (2)
5,032,979 Distributed security auditing subsystem for an operating system 314 1990
5,539,906 Method and apparatus for controlling access to data elements in a data processing system based on status of an industrial process 41 1995
 
CONTEL FEDERAL SYSTEMS, INC., A DE CORP. (1)
4,503,499 Controlled work flow system 191 1982
 
FIRESTAR SOFTWARE, INC. (1)
5,542,078 Object oriented data store integration environment for integration of object oriented databases and non-object oriented data facilities 163 1994
 
HEWLETT-PACKARD COMPANY (1)
5,133,075 Method of monitoring changes in attribute values of object in an object-oriented database 355 1988
 
Hewlett-Packard Laboratories (1)
5,802,542 Information management system for a dynamic system and method thereof 12 1995
 
MICROSOFT CORPORATION (1)
5,764,890 Method and system for adding a secure network server to an existing computer network 190 1997
 
MNAP TECHNOLOGIES INTERNATIONAL, INC. (1)
5,483,649 Personal computer security system 77 1994
 
ROCKET SOFTWARE, INC. (1)
5,305,456 Apparatus and method for computer system integrated security 43 1991
 
SUN MICROSYSTEMS, INC. (1)
5,680,461 Secure network protocol system and method 72 1995
 
Other [Check patent profile for assignment information] (1)
4,455,093 Timer mechanism for rental equipment 6 1982

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
ORACLE INTERNATIONAL CORPORATION (13)
6,158,010 System and method for maintaining security in a distributed computer network 340 1999
7,506,357 System and method for maintaining security in a distributed computer network 5 2000
6,941,472 System and method for maintaining security in a distributed computer network 71 2001
7,673,323 System and method for maintaining security in a distributed computer network 16 2001
7,363,650 System and method for incrementally distributing a security policy in a computer network 22 2002
7,350,226 System and method for analyzing security policies in a distributed computer network 38 2002
7,966,493 Method of and system for determining if an electronic signature is necessary in order to commit a transaction to a database 1 2003
7,644,432 Policy inheritance through nested groups 28 2004
7,603,547 Security control module 16 2004
7,603,548 Security provider development model 14 2004
7,594,112 Delegated administration for a distributed security system 10 2004
7,594,224 Distributed enterprise security system 20 2004
7,318,237 System and method for maintaining security in a distributed computer network 96 2005
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (6)
7,035,895 Manager object for management of multiple resources on dataless clients in a distributed computing environment 3 1998
6,446,069 Access control system for a multimedia datastore 20 1999
7,472,190 Method, system and program product for preserving a user state in an application 0 2003
8,725,521 System and method for designing secure business solutions using patterns 0 2004
7,493,347 Method for condensing reported checkpoint log data 1 2005
7,953,874 System and program product for preserving a user state in an application 0 2008
 
MCAFEE, INC. (2)
7,308,702 Locally adaptable central security management in a heterogeneous network environment 58 2000
8,181,222 Locally adaptable central security management in a heterogeneous network environment 0 2007
 
AASTRA TECHNOLOGIES LIMITED (1)
6,928,553 Providing internet protocol (IP) security 25 2001
 
ANTHURIUM SOLUTIONS, INC. (1)
8,700,694 Systems and methods for managing workflow based on multi-level specification of job processing requirements 0 2004
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (1)
7,236,939 Peer-to-peer inter-enterprise collaborative process management method and system 5 2001
 
MICROSOFT CORPORATION (1)
8,224,780 Checkpoints for a file system 0 2010
 
SAP AG (1)
6,470,353 Object-oriented framework for managing access control in a multimedia database 15 1999
 
TERADATA US, INC. (1)
7,689,863 Restartable database loads using parallel data streams 3 2004

Full Text

 
loading....