US Patent No: 6,055,637

Number of patents in Portfolio can not be more than 2000

System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential

1 Status Updates

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A resource access control system and method (50) for a corporate enterprise includes a security administrator (60, 62) in communication with a plurality of users (90), each of the users (90) having an assigned role and a unique user identifier. A temporary credential token (52) is generated correlative to the assigned role of the user by the security administrator (62) as the user logs on by entering the assigned unique user identifier and indicates a desire to access a resource (56). The temporary credential token (52) is communicated to the resource (56) and any subsequent resources (56) to allow access by the user (90), and deleted as the user (90) terminates the session.

Loading the Abstract Image... loading....

First Claim

See full text

all claims..

Related Publications

Loading Related Publications... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.HOUSTON, TX27341

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Champagne, Jean-Paul Evry, FR 3 617
Galindo, Mary A Dallas, TX 1 351
Hickerson, Cynthia M K Bluemont, VA 1 351
Hickman, Donna R White Lake, MI 1 351
Hudson, Jerome D Flushing, MI 1 351
Lockhart, Robert P Plano, TX 1 351
Saddler, Nancy B Plano, TX 1 351
Stange, Patricia A Rochester Hills, MI 1 351

Cited Art Landscape

Patent Info (Count) # Cites Year
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (5)
5,506,961 Connection authorizer for controlling access to system resources 91 1994
5,542,046 Server entity that provides secure access to its resources through token validation 90 1995
5,911,143 Method and system for advanced role-based access control in distributed and centralized computer systems 177 1995
5,815,574 Provision of secure access to external resources from a distributed computing environment 119 1995
5,864,665 Auditing login activity in a distributed computing environment 80 1996
 
MICROSOFT CORPORATION (2)
5,815,665 System and method for providing trusted brokering services over a distributed network 640 1996
5,757,920 Logon certification 172 1997
 
Bull HN Information Systems Inc. (1)
5,274,824 Keyring metaphor for user's security keys on a distributed multiprocess data system 40 1991
 
CERTCO, INC. (1)
5,659,616 Method for securely using digital signatures in a commercial cryptographic system 350 1996
 
EMC CORPORATION (1)
5,818,936 System and method for automically authenticating a user in a distributed network system 150 1996
 
GOOGLE INC. (1)
5,534,855 Method and system for certificate based alias detection 227 1994
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (1)
5,315,657 Compound principals in access control lists 169 1990
 
IDENTITY VERIFICATION SOLUTIONS LLC (1)
5,841,970 Authentication method for networks 111 1996
 
LOCKHEED MARTIN CORPORATION (1)
5,684,950 Method and system for authenticating users to multiple computer servers via a single sign-on 248 1996
 
QWEST COMMUNICATIONS INTERNATIONAL INC. (1)
5,748,890 Method and system for authenticating and auditing access by a user to non-natively secured applications 106 1996
 
RAKUTEN, INC. (1)
5,455,953 Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket 406 1993
 
RAYTHEON COMPANY (1)
5,241,594 One-time logon means and methods for distributed computing systems 295 1992
 
TOYOTA JIDOSHA KABUSHIKI KAISHA (1)
5,899,952 Device for estimating slip angle of vehicle body through interrelation thereof with yaw rate 27 1996
 
XEROX CORPORATION (1)
5,649,099 Method for delegating access rights through executable access control program without delegating access rights not in a specification to any intermediary nor comprising server security 242 1993

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
INTEL CORPORATION (94)
7,356,817 Real-time scheduling of virtual machines 12 2000
7,111,176 Generating isolated bus cycles for isolated execution 6 2000
7,089,418 Managing accesses in a processor for isolated execution 5 2000
7,073,071 Platform and method for generating and utilizing a protected audit log 5 2000
7,013,481 Attestation key memory device and bus 16 2000
7,013,484 Managing a secure environment using a chipset in isolated execution mode 18 2000
6,996,710 Platform and method for issuing and certifying a hardware-protected attestation key 15 2000
6,990,579 Platform and method for remote attestation of a platform 14 2000
6,957,332 Managing a secure platform using a hierarchical executive architecture in isolated execution mode 8 2000
6,760,441 Generating a key hieararchy for use in an isolated execution environment 33 2000
6,754,815 Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set 24 2000
6,678,825 Controlling access to multiple isolated memories in an isolated execution environment 92 2000
6,633,963 Controlling access to multiple memory zones in an isolated execution environment 140 2000
7,085,935 Managing a secure environment using a chipset in isolated execution mode 3 2000
7,082,615 Protecting software environment in isolated execution 25 2000
6,941,458 Managing a secure platform using a hierarchical executive architecture in isolated execution mode 7 2000
7,793,111 Mechanism to handle events in a machine with isolated execution 0 2000
7,389,427 Mechanism to secure computer output from software attack using isolated execution 7 2000
6,795,905 Controlling accesses to isolated memory using a memory controller for isolated execution 20 2000
7,215,781 Creation and distribution of a secret value between two devices 1 2000
7,818,808 Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor 13 2000
7,225,441 Mechanism for providing power management through virtualization 41 2000
7,117,376 Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations 20 2000
7,035,963 Method for resolving address space conflicts between a virtual machine monitor and a guest operating system 24 2000
6,907,600 Virtual translation lookaside buffer 61 2000
6,769,058 Resetting a processor in an isolated execution environment 7 2000
7,194,634 Attestation key memory device and bus 11 2001
7,096,497 File checking using remote signing authority via a network 11 2001
7,191,440 Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor 49 2001
7,024,555 Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment 20 2001
7,103,771 Connecting a virtual token to a physical token 33 2001
7,308,576 Authenticated code module 3 2001
7,480,806 Multi-token seal and unseal 6 2002
7,631,196 Method and apparatus for loading a trustable operating system 1 2002
7,069,442 System and method for execution of a secured environment initialization instruction 23 2002
7,028,149 System and method for resetting a platform configuration register 40 2002
7,076,669 Method and apparatus for communicating securely with a token 2 2002
7,058,807 Validation of inclusion of a platform within a data center 15 2002
7,127,548 Control register access virtualization performance improvement in the virtual-machine architecture 9 2002
7,139,890 Methods and arrangements to interface memory 16 2002
6,820,177 Protected configuration space in a protected environment 8 2002
7,142,674 Method of confirming a secure key exchange 8 2002
7,392,415 Sleep protection 1 2002
7,124,327 Control over faults occurring during the operation of guest software in the virtual-machine architecture 17 2002
6,996,748 Handling faults associated with operation of guest software in the virtual-machine architecture 13 2002
7,296,267 System and method for binding virtual machines to hardware contexts 42 2002
7,165,181 System and method for establishing trust without revealing identity 22 2002
7,073,042 Reclaiming existing fields in address translation data structures to extend control over memory accesses 15 2002
7,318,235 Attestation using both fixed token and portable token 16 2002
7,318,141 Methods and systems to control virtual machines 3 2002
7,900,017 Mechanism for remapping post virtual machine memory pages 1 2002
7,415,708 Virtual machine management using processor state information 18 2003
7,424,709 Use of multiple virtual machine monitors to handle privileged events 15 2003
7,287,197 Vectoring an interrupt or exception upon resuming operation of a virtual machine 3 2003
7,739,521 Method of obscuring cryptographic computations 0 2003
7,366,305 Platform and method for establishing trust without revealing identity 4 2003
7,237,051 Mechanism to control hardware interrupt acknowledgement in a virtual machine system 11 2003
7,177,967 Chipset support for managing hardware interrupts in a virtual machine system 13 2003
7,020,738 Method for resolving address space conflicts between a virtual machine monitor and a guest operating system 9 2003
6,934,817 Controlling access to multiple memory zones in an isolated execution environment 17 2003
7,636,844 Method and system to provide a trusted channel within a computer system for a SIM device 5 2003
8,156,343 Accessing private data about the state of a data processing machine from storage that is publicly accessible 0 2003
8,037,314 Replacing blinded authentication authority 2 2003
7,802,085 Apparatus and method for distributing private keys to an entity with minimal secret, unique information 3 2004
7,356,735 Providing support for single stepping a virtual machine in a virtual machine environment 5 2004
7,620,949 Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment 2 2004
7,490,070 Apparatus and method for proving the denial of a direct proof signature 7 2004
7,366,849 Protected configuration space in a protected environment 5 2004
7,305,592 Support for nested fault in a virtual machine environment 16 2004
7,840,962 System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time 2 2004
8,146,078 Timer offsetting mechanism in a virtual machine environment 5 2004
8,533,777 Mechanism to determine trust of out-of-band management agents 0 2004
7,395,405 Method and apparatus for supporting address translation in a virtual machine environment 3 2005
7,313,669 Virtual translation lookaside buffer 3 2005
7,546,457 System and method for execution of a secured environment initialization instruction 6 2005
7,809,957 Trusted platform module for generating sealed data 6 2005
7,302,511 Chipset support for managing hardware interrupts in a virtual machine system 6 2005
7,516,330 Platform and method for establishing provable identities while maintaining privacy 2 2005
7,921,293 Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment 0 2006
8,014,530 Method and apparatus for authenticated, recoverable key distribution with no database secrets 0 2006
7,454,611 System and method for establishing trust without revealing identity 2 2007
7,836,275 Method and apparatus for supporting address translation in a virtual machine environment 3 2008
8,296,762 Virtual machine management using processor state information 0 2008
8,185,734 System and method for execution of a secured environment initialization instruction 1 2009
7,861,245 Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment 0 2009
8,407,476 Method and apparatus for loading a trustable operating system 0 2009
8,386,788 Method and apparatus for loading a trustable operating system 0 2009
8,639,915 Apparatus and method for distributing private keys to an entity with minimal secret, unique information 0 2010
8,671,275 Mechanism to handle events in a machine with isolated execution 0 2010
8,522,044 Mechanism to handle events in a machine with isolated execution 0 2010
8,543,772 Invalidating translation lookaside buffer entries in a virtual machine (VM) system 0 2010
8,195,914 Mechanism for remapping post virtual machine memory pages 0 2011
8,645,688 System and method for execution of a secured environment initialization instruction 0 2012
8,751,752 Invalidating translation lookaside buffer entries in a virtual machine system 0 2013
 
ORACLE INTERNATIONAL CORPORATION (46)
7,506,357 System and method for maintaining security in a distributed computer network 5 2000
7,392,546 System and method for server security and entitlement processing 19 2001
7,673,323 System and method for maintaining security in a distributed computer network 16 2001
7,499,948 System and method for web-based personalization and ecommerce management 59 2002
7,363,650 System and method for incrementally distributing a security policy in a computer network 22 2002
7,350,226 System and method for analyzing security policies in a distributed computer network 38 2002
7,472,342 System and method for portal page layout 13 2002
7,451,163 Data synchronization 20 2002
7,451,477 System and method for rule-based entitlements 9 2002
7,367,014 System and method for XML data representation of portlets 9 2002
7,240,280 System and method for application flow integration in a portal framework 27 2002
8,375,113 Employing wrapper profiles 0 2002
7,653,930 Method for role and resource policy management optimization 5 2003
7,591,000 System and method for hierarchical role-based entitlements 6 2003
7,725,560 Web service-enabled portlet wizard 5 2003
7,496,687 Enterprise application platform 10 2003
8,468,330 Methods, systems, and data structures for loading and authenticating a module 0 2003
7,840,614 Virtual content repository application program interface 3 2003
7,562,298 Virtual content repository browser 1 2003
7,483,904 Virtual repository content model 0 2003
7,810,036 Systems and methods for personalizing a portal 2 2004
7,774,601 Method for delegated administration 1 2004
7,644,432 Policy inheritance through nested groups 28 2004
7,603,547 Security control module 16 2004
7,603,548 Security provider development model 14 2004
7,594,112 Delegated administration for a distributed security system 10 2004
7,594,224 Distributed enterprise security system 20 2004
7,580,953 System and method for schema lifecycles in a virtual content repository that integrates a plurality of content repositories 1 2005
7,516,167 Data synchronization 1 2005
8,234,694 Method and apparatus for re-establishing communication between a client and a server 0 2005
7,433,896 Federated management of content repositories 8 2006
7,783,670 Client server conversion for representing hierarchical data structures 0 2006
7,917,537 System and method for providing link property types for content management 0 2006
7,818,344 System and method for providing nested types for content management 1 2006
7,398,311 Selective cache flushing in identity and access management systems 14 2006
7,426,548 Enterprise application platform 9 2007
7,904,953 Pagelets 2 2007
7,886,352 Interstitial pages 4 2007
7,865,943 Credential vault encryption 5 2007
7,861,289 Pagelets in adaptive tags in non-portal reverse proxy 3 2007
7,861,290 Non-invasive insertion of pagelets 2 2007
7,823,189 System and method for dynamic role association 9 2008
8,099,779 Federated management of content repositories 0 2008
7,992,189 System and method for hierarchical role-based entitlements 1 2009
8,136,150 User role mapping in web applications 4 2010
8,397,283 User role mapping in web applications 0 2012
 
JPMORGAN CHASE BANK, N.A. (44)
8,571,975 System and method for sending money via E-mail over the internet 0 1999
6,867,789 System and method for generating graphical user interfaces 21 2000
7,058,817 System and method for single sign on process for websites with multiple applications and services 46 2000
7,747,866 System and method providing improved error detection related to transmission of data over a communication link 5 2000
7,321,864 System and method for providing funding approval associated with a project based on a document collection 88 2000
7,246,263 System and method for portal infrastructure tracking 15 2001
7,103,576 System for providing cardless payment 22 2001
7,099,850 Methods for providing cardless payment 25 2001
8,438,086 System and method for providing customers with seamless entry to a remote server 0 2001
7,987,501 System and method for single session sign-on 1 2001
7,941,533 System and method for single sign-on session management without central server 4 2002
7,246,324 Method and system for data capture with hidden applets 11 2002
7,689,506 System and method for rapid updating of credit information 11 2002
7,143,174 Method and system for delayed cookie transmission in a client-server architecture 4 2002
7,472,171 Method and system for determining receipt of a delayed cookie in a client-server architecture 12 2002
8,266,437 Electronic vouchers and a system and method for issuing the same 0 2002
7,058,660 System and method for network-based project management 5 2002
7,689,504 System and method for establishing or modifying an account with user selectable terms 35 2002
8,301,493 System and method for providing incentives to consumers to share information 0 2002
7,353,383 System and method for single session sign-on with cryptography 21 2003
8,306,907 System and method for offering risk-based interest rates in a credit instrument 2 2003
7,376,838 Method for controlled and audited access to privileged accounts on computer systems 11 2003
7,421,696 Methods and systems for managing successful completion of a network of processes 1 2004
7,742,997 System and method for management and delivery of content and rules 6 2004
8,190,893 Portable security transaction protocol 3 2004
8,185,877 System and method for testing applications 11 2005
7,783,578 System for providing cardless payment 3 2006
7,461,265 System and method for single sign on process for websites with multiple applications and services 17 2006
7,444,672 System and method for single sign on process for websites with multiple applications and services 18 2006
8,583,926 System and method for anti-phishing authentication 0 2006
8,145,522 System and method for establishing or modifying an account with user selectable terms 4 2006
7,966,496 System and method for single sign on process for websites with multiple applications and services 5 2006
8,335,855 System and method for portal infrastructure tracking 0 2007
8,185,940 System and method for providing discriminated content to network users 1 2007
7,685,013 System and method for automatic financial project management 13 2007
8,473,735 Systems and methods for managing digital certificates 1 2008
8,590,008 System and method for single sign on process for websites with multiple applications and services 0 2008
8,321,682 System and method for generating and managing administrator passwords 2009
8,160,960 System and method for rapid updating of credit information 4 2009
8,732,072 System and method for establishing or modifying an account with user selectable terms 0 2010
8,266,054 System and method for implementing a consolidated application process 0 2012
8,458,070 System and method for providing customers with seamless entry to a remote server 0 2012
8,549,315 System and method for generating and managing administrator passwords 0 2012
8,726,011 Systems and methods for managing digital certificates 0 2013
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (23)
6,557,032 Data processing system using active tokens and method for controlling such a system 20 1998
6,823,513 Workflow distribution process granting to operators with assigned activities access to needed computer resources and withdrawing such access upon the completion of the assigned activity 20 2000
7,082,455 Method and apparatus of parameter passing of structured data for stored procedures in a content management system 10 2002
7,035,854 Content management system and methodology employing non-transferable access tokens to control data access 50 2002
6,999,966 Content management system and methodology for implementing a complex object using nested/recursive structures 10 2002
6,950,815 Content management system and methodology featuring query conversion capability for efficient searching 14 2002
6,947,948 Version-enabled, multi-typed, multi-targeting referential integrity relational database system and methodology 6 2002
6,944,627 Content management system and methodology employing a tree-based table hierarchy featuring arbitrary information retrieval from different locations in the hierarchy 3 2002
6,938,050 Content management system and methodology employing a tree-based table hierarchy which accomodates opening a dynamically variable number of cursors therefor 7 2002
7,216,125 Methods and apparatus for pre-filtered access control in computing systems 16 2002
7,533,157 Method for delegation of administrative operations in user enrollment tasks 2 2002
7,392,246 Method for implementing access control for queries to a content management system 0 2003
7,523,316 Method and system for managing the display of sensitive content in non-trusted environments 5 2003
7,467,386 Parameter passing of data structures where API and corresponding stored procedure are different versions/releases 1 2004
7,472,277 User controlled anonymity when evaluating into a role 3 2004
8,230,224 Transmitting security data in multipart communications over a network 2005
8,533,168 Automatic policy generation based on role entitlements and identity attributes 0 2007
8,499,339 Authenticating and communicating verifiable authorization between disparate network domains 0 2007
8,161,495 Parameters passing of data structures where API and corresponding stored procedure are different versions/releases 0 2008
7,761,443 Implementing access control for queries to a content management system 4 2008
7,818,576 User controlled anonymity when evaluating into a role 1 2008
7,694,148 Method and system for managing the display of sensitive content in non-trusted environments 4 2009
8,359,396 Multiple identity management in an electronic commerce site 0 2011
 
MICROSOFT CORPORATION (16)
7,703,131 Secured distributed impersonation 0 2000
7,076,797 Granular authorization for network user sessions 24 2001
7,401,235 Persistent authorization context based on external authentication 15 2002
7,546,633 Role-based authorization management framework 12 2002
7,353,282 Methods and systems for sharing a network resource with a user without current access 8 2002
7,827,595 Delegated administration of a hosted resource 3 2003
7,496,761 Method and system for batch task creation and execution 2 2004
7,945,942 System and methods for exchanging user interface data in a multi-user system 0 2005
8,060,932 Modular enterprise authorization solution 1 2006
7,979,893 Tailored system management interface 1 2007
8,032,935 Security synchronization services 0 2007
8,271,536 Multi-tenancy using suite of authorization manager components 1 2008
8,413,210 Credential sharing between multiple client applications 1 2008
8,505,084 Data access programming model for occasionally connected applications 0 2009
8,533,772 Role-based authorization management framework 1 2009
8,631,463 Tailored system management interface 0 2011
 
WAYPORT, INC. (11)
8,417,763 Providing information to a computing device based on known location and user information 0 2004
8,478,887 Providing advertisements to a computing device based on a predetermined criterion of a wireless access point 0 2006
7,840,689 Dynamically modifying the display of a computing device to provide advertisements 2 2006
8,588,130 Distributed network communication system to provide wireless access to a computing device at a reduced rate 0 2006
8,509,246 Method and apparatus for geographic-based communications service 2 2007
8,250,204 Method and apparatus for geographic-based communications service 3 2007
8,095,647 Method and apparatus for geographic-based communications service 4 2007
8,199,733 Method and apparatus for geographic-based communications service 3 2007
8,606,851 Method and apparatus for geographic-based communications service 0 2011
8,631,128 Method and apparatus for geographic-based communications service 0 2012
8,583,723 Receiving location based advertisements on a wireless communication device 0 2012
 
BELLSOUTH INTELLECTUAL PROPERTY CORPORATION (8)
6,968,385 Systems and methods for limiting web site access 16 2001
7,664,509 Location blocking service for wireless networks 19 2003
8,504,705 Systems and methods for limiting web site access 0 2005
8,639,235 System and method for using location information to execute an action 1 2008
8,538,456 Surveying wireless device users by location 0 2011
8,402,117 Anonymous location service for wireless networks 0 2011
8,494,501 Identity blocking service from a wireless service provider 3 2012
8,509,813 Location blocking service from a wireless service provider 0 2012
 
AT&T INTELLECTUAL PROPERTY I, L.P. (7)
7,593,712 System and method for using location information to execute an action 46 2005
7,941,130 System and method for using location information to execute an action 13 2006
8,644,506 Location-based security rules 0 2007
8,260,239 System and method for using location information to execute an action 0 2008
8,645,505 Anonymous location service for wireless networks 0 2013
8,755,777 Identity blocking service from a wireless service provider 0 2013
8,718,618 Identity blocking service from a wireless service provider 0 2013
 
CISCO TECHNOLOGY, INC. (5)
6,934,855 Remote administration of smart cards for secure access systems 14 1999
7,010,600 Method and apparatus for managing network resources for externally authenticated users 57 2001
7,690,029 Remote administration of smart cards for secure access systems 3 2005
7,882,552 Remote administration of smart cards for secure access systems 2 2005
7,757,273 Remote administration of smart cards for secure access systems 1 2005
 
DIGITAL ASSET ENTERPRISES, L.L.C. (4)
7,143,024 Associating identifiers with virtual processes 12 2000
7,219,354 Virtualizing super-user privileges for multiple virtual processes 19 2000
RE44723 Regulating file access rates according to file type 0 2007
RE44210 Virtualizing super-user privileges for multiple virtual processes 0 2009
 
FACEBOOK, INC. (4)
7,707,627 Leveraging a persistent connection to access a secured service 3 2007
8,176,541 Leveraging a persistent connection to access a secured service 2 2010
8,689,312 Leveraging a persistent connection to access a secured service 0 2012
8,769,645 Brokering a connection to access a secured service 0 2012
 
III HOLDINGS 1, LLC (4)
7,207,058 Method and system for transmitting authentication context information 7 2002
7,761,909 Method and system for transmitting authentication context information 0 2007
8,181,231 Method and system for transmitting authentication context information 0 2010
8,607,314 Method and system for transmitting authentication context information 0 2012
 
INVENSYS SYSTEMS, INC. (4)
7,707,550 Supervisory process control and manufacturing information system application having an extensible component model 17 2002
7,650,607 Supervisory process control and manufacturing information system application having a layered architecture 3 2002
8,230,443 Supervisory process control and manufacturing information system application having a layered architecture 2010
8,707,399 Security architecture for a process control platform executing applications 0 2012
 
KABUSHIKI KAISHA TOSHIBA (4)
6,539,481 Computer resource assignment of a temporary user from a computer pool of available identifiers 32 1998
7,246,372 Portable device and a method for accessing a computer resource of a temporary registered user 2 2002
7,467,213 Portable device and a method for accessing a computer resource of a temporary registered user 0 2007
7,464,399 Portable device and a method for accessing a computer resource of a temporary registered user 0 2007
 
VERSATA DEVELOPMENT GROUP, INC. (4)
7,958,024 Method and apparatus for processing sales transaction data 0 2001
7,925,513 Framework for processing sales transaction data 6 2001
7,908,304 Method and system for managing distributor information 0 2001
7,904,326 Method and apparatus for performing collective validation of credential information 1 2001
 
CITIBANK DEVELOPMENT CENTER, INC. (3)
8,146,141 Method and system for secure authentication of a user by a host system 2 2004
8,302,172 Methods and systems for secure authentication of a user by a host system 0 2011
8,650,625 Method and system for secure authentication of a user by a host system 0 2012
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (3)
7,149,806 Data access in a distributed environment 19 2002
7,590,630 Managing electronic information 2 2003
7,904,476 Computer-implemented method for compressing representation of binary relation 1 2007
 
INFOASSURE, INC. (3)
7,739,501 Cryptographic key construct 2 2005
7,715,565 Information-centric security 8 2005
7,711,120 Cryptographic key management 3 2005
 
INTELLECTUAL VENTURES I LLC (3)
7,343,421 Restricting communication of selected processes to a set of specific network addresses 9 2000
7,739,401 Restricting communication of selected processes to a set of specific network addresses 6 2008
8,489,764 Restricting communication of selected processes to a set of specific network addresses 0 2010
 
MCAFEE, INC. (3)
6,357,010 System and method for controlling access to documents stored on an internal network 150 1998
6,640,307 System and method for controlling access to documents stored on an internal network 85 2000
7,543,329 System and method for controlling access to documents stored on an internal network 1 2003
 
SPYRUS, INC. (3)
6,816,965 Method and system for a policy enforcing module 12 1999
6,904,523 Method and system for enforcing access to a computing resource using a licensing attribute certificate 25 2002
7,356,692 Method and system for enforcing access to a computing resource using a licensing attribute certificate 16 2005
 
SYMANTEC CORPORATION (3)
8,239,915 Endpoint management using trust rating data 21 2006
8,726,391 Scheduling malware signature updates in relation to threat awareness and environmental safety 0 2008
8,763,076 Endpoint management using trust rating data 0 2012
 
ACCESS 360 (2)
6,985,955 System and method for provisioning resources to users based on roles, organizational information, attributes and third-party information or authorizations 47 2001
6,947,989 System and method for provisioning resources to users based on policies, roles, organizational information, and attributes 55 2001
 
CHASE BANK USA, NATIONAL ASSOCIATION (2)
7,426,530 System and method for providing customers with seamless entry to a remote server 28 2000
7,756,816 System and method for network-based project management 1 2005
 
COURION CORPORATION (2)
8,539,568 Identity map creation 0 2008
8,601,562 Policy enforcement using ESSO 2 2008
 
EMD MILLIPORE CORPORATION (2)
7,661,127 Instrument access control system 0 2002
8,250,636 Instrument access control system 0 2010
 
FUJITSU LIMITED (2)
7,165,267 Storing apparatus and password control method 17 1998
7,302,581 Storing apparatus and password control method 7 2005
 
GOOGLE INC. (2)
6,665,814 Method and apparatus for providing serialization support for a computer system 26 2000
7,272,852 Reserve/release control method 3 2004
 
MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. (2)
6,910,132 Secure system and method for accessing files in computers using fingerprints 10 2000
7,379,942 Approval authority registration system and method 0 2004
 
SYBASE, INC. (2)
8,478,668 Hierarchical entitlement system with integrated inheritance and limit checks 0 2004
7,797,239 Hierarchical entitlement system with integrated inheritance and limit checks 0 2006
 
ALCATEL LUCENT (1)
8,069,475 Distributed authentication functionality 1 2005
 
AT&T INTELLECTUAL PROPERTY, INC. (1)
7,428,411 Location-based security rules 16 2005
 
BANK OF AMERICA CORPORATION (1)
8,726,340 Apparatus and method for expert decisioning 0 2012
 
CHASE MANHATTAN BANKS USA, NATIONAL ASSOCIATION (1)
7,272,857 Method/system for preventing identity theft or misuse by restricting access 10 2002
 
CITICORP DEVELOPMENT CENTER, INC. (1)
7,137,006 Method and system for single sign-on user access to multiple web servers 78 2000
 
ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE (1)
7,290,279 Access control method using token having security attributes in computer system 5 2002
 
EMC CORPORATION (1)
8,230,484 Control of resource access privileges via agent authentication 2008
 
ENTRUST, INC. (1)
6,453,353 Role-based navigation of information resources 302 1999
 
FELSHER, DAVID P., MR. (1)
7,181,017 System and method for secure three-party communications 321 2002
 
GENERAL ELECTRIC COMPANY (1)
8,332,910 Method and apparatus for selective data control 0 2003
 
GOOD TECHNOLOGY CORPORATION (1)
8,117,344 Global server for authenticating access to remote services 7 2009
 
HONESTY ONLINE, LLC (1)
8,438,622 Methods and apparatus for authorizing access to data 0 2008
 
J.P. MORGAN CHASE & CO. (1)
7,831,508 System and method for implementing a consolidated application process 1 2000
 
J.P. MORGAN CHASE BANK (1)
7,392,386 Setuid-filter method for providing secure access to a credentials store for computer systems 0 2004
 
MICRON TECHNOLOGY, INC. (1)
7,610,611 Prioritized address decoder 1 2003
 
NOKIA CORPORATION (1)
7,191,216 System and method for controlling access to downloadable resources 13 2001
 
PARAGON TRADE BRANDS, INC. (1)
7,266,839 System and method for providing discriminated content to network users 18 2001
 
PRISM TECHNOLOGIES LLC (1)
8,661,512 Method for managing access to protected computer resources 0 2013
 
SAP AG (1)
7,403,989 Facilitating improved workflow 0 2002
 
SIEMENS IT SOLUTIONS AND SERVICES GMBH (1)
7,730,093 Method for controlling access to the resources of a data processing system, data processing system, and computer program 0 2002
 
SONY CORPORATION (1)
7,639,951 Contents-delivery system, contents-transmission device, contents-reception device, and contents-delivery method 5 2005
 
Sprint Communications Company L.P. (1)
6,131,164 Reverse internet protocol lookup 11 1998
 
Teleran Technologies, Inc. (1)
7,140,035 Rule based security policy enforcement 17 2000
 
TOSHIBA TEC KABUSHIKI KAISHA (1)
7,478,421 System and method for role based access control of a document processing device 5 2004
 
Other [Check patent profile for assignment information] (12)
7,587,368 Information record infrastructure, system and method 62 2001
7,010,565 Communication management using a token action log 6 2003
7,233,961 Managing a message communication and file system 1 2004
7,155,614 System and method for single sign on process for websites with multiples applications and services 13 2006
8,600,341 System and method for location based exchanges of data facilitating distributed locational applications 0 2008
8,639,267 System and method for location based exchanges of data facilitating distributed locational applications 0 2008
8,634,796 System and method for location based exchanges of data facilitating distributed location applications 0 2009
8,566,839 System and method for automated content presentation objects 0 2010
8,600,830 System and method for providing a payment to a non-winning auction participant 1 2010
8,718,598 System and method for location based exchange vicinity interest specification 0 2013
8,761,804 System and method for location based exchanges of data facilitating distributed locational applications 0 2013
8,750,823 System and method for location based exchanges of data facilitating distributed locational applications 0 2013

Full Text

 
loading....