US Patent No: 6,055,637

Number of patents in Portfolio can not be more than 2000

System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential

1 Status Updates

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A resource access control system and method (50) for a corporate enterprise includes a security administrator (60, 62) in communication with a plurality of users (90), each of the users (90) having an assigned role and a unique user identifier. A temporary credential token (52) is generated correlative to the assigned role of the user by the security administrator (62) as the user logs on by entering the assigned unique user identifier and indicates a desire to access a resource (56). The temporary credential token (52) is communicated to the resource (56) and any subsequent resources (56) to allow access by the user (90), and deleted as the user (90) terminates the session.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPHOUSTON, TX9475

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Champagne, Jean-Paul Evry, FR 3 708
Galindo, Mary A Dallas, TX 1 401
Hickerson, Cynthia M K Bluemont, VA 1 401
Hickman, Donna R White Lake, MI 1 401
Hudson, Jerome D Flushing, MI 1 401
Lockhart, Robert P Plano, TX 1 401
Saddler, Nancy B Plano, TX 1 401
Stange, Patricia A Rochester Hills, MI 1 401

Cited Art Landscape

Patent Info (Count) # Cites Year
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (5)
* 5,506,961 Connection authorizer for controlling access to system resources 95 1994
* 5,542,046 Server entity that provides secure access to its resources through token validation 95 1995
* 5,911,143 Method and system for advanced role-based access control in distributed and centralized computer systems 211 1995
* 5,815,574 Provision of secure access to external resources from a distributed computing environment 126 1995
* 5,864,665 Auditing login activity in a distributed computing environment 86 1996
 
CERTCO, LLC (1)
* 5,659,616 Method for securely using digital signatures in a commercial cryptographic system 372 1996
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (1)
* 5,315,657 Compound principals in access control lists 174 1990
 
Bull HN Information Systems Inc. (1)
* 5,274,824 Keyring metaphor for user's security keys on a distributed multiprocess data system 41 1991
 
XEROX CORPORATION (1)
* 5,649,099 Method for delegating access rights through executable access control program without delegating access rights not in a specification to any intermediary nor comprising server security 270 1993
 
IDENTITY VERIFICATION SOLUTIONS LLC (1)
* 5,841,970 Authentication method for networks 122 1996
 
EMC CORPORATION (1)
* 5,818,936 System and method for automically authenticating a user in a distributed network system 161 1996
 
QWEST COMMUNICATIONS INTERNATIONAL INC. (1)
* 5,748,890 Method and system for authenticating and auditing access by a user to non-natively secured applications 117 1996
 
MICROSOFT TECHNOLOGY LICENSING, LLC (2)
* 5,815,665 System and method for providing trusted brokering services over a distributed network 716 1996
* 5,757,920 Logon certification 189 1997
 
TOYOTA JIDOSHA KABUSHIKI KAISHA (1)
* 5,899,952 Device for estimating slip angle of vehicle body through interrelation thereof with yaw rate 27 1996
 
GOOGLE INC. (1)
* 5,534,855 Method and system for certificate based alias detection 244 1994
 
LOCKHEED MARTIN CORPORATION (1)
* 5,684,950 Method and system for authenticating users to multiple computer servers via a single sign-on 284 1996
 
RAYTHEON COMPANY (1)
* 5,241,594 One-time logon means and methods for distributed computing systems 322 1992
 
RAKUTEN, INC. (1)
* 5,455,953 Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket 436 1993
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (43)
* 7,010,565 Communication management using a token action log 8 2003
* 2004/0073,621 Communication management using a token action log 2 2003
* 2004/0064,813 Method for resolving address space conflicts between a virtual machine monitor and a guest operating system 4 2003
* 2004/0078,590 Controlling access to multiple memory zones in an isolated execution environment 1 2003
* 2005/0022,002 Protected configuration space in a protected environment 20 2004
7,233,961 Managing a message communication and file system 2 2004
* 2005/0050,007 Managing a message communication and file system 2 2004
* 2005/0182,940 System and method for execution of a secured environment initialization instruction 23 2005
* 2005/0283,660 Mechanism to handle events in a machine with isolated execution 8 2005
* 2006/0036,791 Chipset support for managing hardware interrupts in a virtual machine system 1 2005
7,155,614 System and method for single sign on process for websites with multiples applications and services 20 2006
* 2006/0245,590 Method of confirming a secure key exchange 6 2006
* 2008/0016,104 Automatic Policy Generation Based on Role Entitlements and Identity Attributes 3 2007
8,600,341 System and method for location based exchanges of data facilitating distributed locational applications 3 2008
* 2009/0006,805 Method and apparatus for supporting address translation in a virtual machine environment 11 2008
* 2008/0276,235 VIRTUAL MACHINE MANAGEMENT USING PROCESSOR STATE INFORMATION 8 2008
8,639,267 System and method for location based exchanges of data facilitating distributed locational applications 4 2008
* 2009/0119,755 SYSTEM AND METHOD FOR ROLE BASED ACCESS CONTROL OF A DOCUMENT PROCESSING DEVICE 3 2009
* 2010/0058,075 METHOD AND APPARATUS FOR LOADING A TRUSTABLE OPERATING SYSTEM 0 2009
8,634,796 System and method for location based exchanges of data facilitating distributed location applications 20 2009
8,566,839 System and method for automated content presentation objects 0 2010
8,600,830 System and method for providing a payment to a non-winning auction participant 12 2010
* 2011/0004,513 SYSTEM AND METHOD 38 2010
8,887,177 System and method for automated content distribution objects 0 2013
9,078,095 System and method for location based inventory management 0 2013
9,014,658 System and method for application context location based configuration suggestions 0 2013
8,923,806 System and method for presenting application data by data processing system(s) in a vicinity 0 2013
8,897,741 System and method for mobile device usability by locational conditions 1 2013
8,897,742 System and method for sudden proximal user interface 0 2013
8,718,598 System and method for location based exchange vicinity interest specification 16 2013
8,886,226 System and method for timely whereabouts determination by a mobile data processing system 0 2013
8,761,804 System and method for location based exchanges of data facilitating distributed locational applications 1 2013
8,750,823 System and method for location based exchanges of data facilitating distributed locational applications 0 2013
9,253,597 System and method for determining mobile users of interest 0 2013
9,100,792 System and method for service-free location based applications 0 2013
9,088,868 Location based exchange permissions 0 2013
9,088,869 System and method for application search results by locational conditions 0 2013
9,055,406 Server-less synchronized processing across a plurality of interoperating data processing systems 0 2013
8,942,732 Location based exchange operating system 1 2013
8,942,733 System and method for location based exchanges of data facilitating distributed location applications 0 2013
8,942,693 System and method for targeting data processing system(s) with data 0 2014
9,113,295 System and method for location based exchange vicinity interest specification 0 2014
9,204,275 System and method for targeting data processing system(s) with data 0 2014
 
WELLS FARGO BANK, NATIONAL ASSOCIATION (1)
* 2002/0184,535 Method and system for accessing a resource in a computing system 29 2001
 
ST. LUKE TECHNOLOGIES, LLC (2)
7,587,368 Information record infrastructure, system and method 99 2001
8,904,181 System and method for secure three-party communications 9 2012
 
CA, INC. (2)
* 9,317,833 Method and apparatus for role grouping by shared resource utilization 0 2011
* 2011/0161,306 Method and Apparatus for Role Grouping by Shared Resource Utilization 1 2011
 
SONY CORPORATION (2)
* 7,639,951 Contents-delivery system, contents-transmission device, contents-reception device, and contents-delivery method 5 2005
* 2005/0276,610 Contents-delivery system, contents-transmission device, contents-reception device, and contents-delivery method 5 2005
 
Janssen Scope LLC (1)
* 2005/0039,041 Access, identity, and ticketing system for providing multiple access methods for smart devices 3 2004
 
SNAP TRENDS, INC. (1)
8,843,515 Methods and systems of aggregating information of social networks based on geographical locations via a network 7 2013
 
VEVEO, INC. (1)
* 2007/0005,563 Method and system for incremental search with reduced text entry where the relevance of results is a dynamically computed function of user input search string character count 82 2005
 
SAMSUNG ELECTRONICS CO., LTD. (2)
* 2011/0041,167 TECHNIQUES FOR PROVIDING SECURE COMMUNICATIONS AMONG CLIENTS WITH EFFICIENT CREDENTIALS MANAGEMENT 4 2010
* 2013/0231,958 METHOD AND APPARATUS FOR PROVIDING PERSONAL HEALTH RECORD INFORMATION 0 2013
 
HITACHI, LTD. (1)
* 2004/0215,831 Method for operating storage system 4 2003
 
AT&T INTELLECTUAL PROPERTY I, L.P. (12)
7,593,712 System and method for using location information to execute an action 51 2005
7,941,130 System and method for using location information to execute an action 25 2006
8,644,506 Location-based security rules 15 2007
* 2008/0096,529 Location-Based Security Rules 70 2007
8,260,239 System and method for using location information to execute an action 5 2008
9,020,489 System and method for using location information to execute an action 0 2012
8,825,035 System and method for remote control of appliances utilizing mobile location-based applications 0 2012
8,645,505 Anonymous location service for wireless networks 0 2013
8,755,777 Identity blocking service from a wireless service provider 0 2013
8,718,618 Identity blocking service from a wireless service provider 0 2013
8,874,140 Location blocking service from a wireless service provider 0 2013
8,805,414 Surveying wireless device users by location 0 2013
 
ORACLE INTERNATIONAL CORPORATION (85)
7,506,357 System and method for maintaining security in a distributed computer network 8 2000
7,392,546 System and method for server security and entitlement processing 26 2001
7,673,323 System and method for maintaining security in a distributed computer network 28 2001
7,499,948 System and method for web-based personalization and ecommerce management 88 2002
* 2003/0217,332 System and method for web-based personalization and ecommerce management 54 2002
7,363,650 System and method for incrementally distributing a security policy in a computer network 28 2002
7,350,226 System and method for analyzing security policies in a distributed computer network 44 2002
* 2003/0115,484 System and method for incrementally distributing a security policy in a computer network 20 2002
7,472,342 System and method for portal page layout 17 2002
7,451,163 Data synchronization 21 2002
* 7,451,477 System and method for rule-based entitlements 11 2002
7,367,014 System and method for XML data representation of portlets 16 2002
7,240,280 System and method for application flow integration in a portal framework 30 2002
* 2003/0149,722 System and method for application flow integration in a portal framework 4 2002
* 2003/0126,558 System and method for XML data representation of portlets 16 2002
* 2003/0110,172 Data synchronization 2 2002
* 2003/0110,448 System and method for portal page layout 6 2002
* 8,375,113 Employing wrapper profiles 0 2002
* 2004/0010,591 Employing wrapper profiles 47 2002
8,831,966 Method for delegated administration 0 2003
7,653,930 Method for role and resource policy management optimization 9 2003
7,591,000 System and method for hierarchical role-based entitlements 8 2003
7,725,560 Web service-enabled portlet wizard 5 2003
7,496,687 Enterprise application platform 16 2003
* 2004/0068,568 Enterprise application platform 36 2003
8,468,330 Methods, systems, and data structures for loading and authenticating a module 1 2003
7,840,614 Virtual content repository application program interface 3 2003
7,562,298 Virtual content repository browser 2 2003
7,483,904 Virtual repository content model 1 2003
* 2004/0167,920 Virtual repository content model 8 2003
* 2004/0167,899 Virtual content repository browser 34 2003
7,810,036 Systems and methods for personalizing a portal 5 2004
* 2004/0230,679 Systems and methods for portal and web server administration 5 2004
* 2004/0230,947 Systems and methods for personalizing a portal 22 2004
7,774,601 Method for delegated administration 1 2004
* 2005/0229,236 Method for delegated adminstration 7 2004
7,644,432 Policy inheritance through nested groups 34 2004
7,603,547 Security control module 42 2004
7,603,548 Security provider development model 43 2004
7,594,112 Delegated administration for a distributed security system 13 2004
7,594,224 Distributed enterprise security system 54 2004
* 2005/0097,350 Security control module 7 2004
* 2005/0081,062 Distributed enterprise security system 2 2004
* 2005/0081,063 Delegated administration for a distributed security system 7 2004
* 2005/0228,827 System and method for viewing a virtual content repository 2 2004
* 2005/0138,412 Resource management with policies 8 2005
7,580,953 System and method for schema lifecycles in a virtual content repository that integrates a plurality of content repositories 1 2005
7,516,167 Data synchronization 3 2005
* 2005/0187,986 Data synchronization 1 2005
* 2007/0061,263 Crafted identities 6 2005
* 8,234,694 Method and apparatus for re-establishing communication between a client and a server 8 2005
* 2007/0136,795 Method and apparatus for re-establishing communication between a client and a server 2 2005
7,433,896 Federated management of content repositories 14 2006
7,783,670 Client server conversion for representing hierarchical data structures 0 2006
7,917,537 System and method for providing link property types for content management 0 2006
7,818,344 System and method for providing nested types for content management 2 2006
* 2007/0073,661 System and method for providing nested types for content management 1 2006
* 2007/0073,744 System and method for providing link property types for content management 17 2006
* 2007/0073,674 System and method for providing federated events for content management systems 7 2006
* 7,398,311 Selective cache flushing in identity and access management systems 18 2006
* 2007/0027,986 Selective cache flushing in identity and access management systems 3 2006
* 2007/0179,802 Policy enforcement via attestations 8 2006
7,426,548 Enterprise application platform 13 2007
* 2007/0214,271 ENTERPRISE APPLICATION PLATFORM 1 2007
* 2007/0214,421 SYSTEM AND METHOD FOR APPLICATION FLOW INTEGRATION IN A PORTAL FRAMEWORK 1 2007
7,904,953 Pagelets 6 2007
7,886,352 Interstitial pages 6 2007
7,865,943 Credential vault encryption 9 2007
7,861,289 Pagelets in adaptive tags in non-portal reverse proxy 5 2007
7,861,290 Non-invasive insertion of pagelets 4 2007
* 2008/0313,728 INTERSTITIAL PAGES 8 2007
* 2008/0250,388 PAGELETS IN ADAPTIVE TAGS 2 2007
* 2008/0077,982 CREDENTIAL VAULT ENCRYPTION 30 2007
* 2008/0077,981 PAGELETS IN ADAPTIVE TAGS IN NON-PORTAL REVERSE PROXY 2 2007
* 2008/0077,809 Credential Vault Encryption 15 2007
7,823,189 System and method for dynamic role association 12 2008
8,099,779 Federated management of content repositories 1 2008
* 2008/0320,022 Federated Management of Content Repositories 2 2008
7,992,189 System and method for hierarchical role-based entitlements 3 2009
* 2010/0037,290 SYSTEM AND METHOD FOR HIERARCHICAL ROLE-BASED ENTITLEMENTS 1 2009
8,136,150 User role mapping in web applications 6 2010
* 2013/0060,659 SYSTEM AND METHOD FOR SPLITTING COLLABORATION ON EVENT METRICS FOR A SUPPLIER TO RESPOND TO BASED ON FUNCTIONAL ROLE 0 2011
8,397,283 User role mapping in web applications 1 2012
* 2015/0074,813 PROTECTION OF RESOURCES DOWNLOADED TO PORTABLE DEVICES FROM ENTERPRISE SYSTEMS 0 2013
9,247,006 Single sign-on between multiple data centers 0 2013
 
SPEX TECHNOLOGIES, INC. (5)
6,816,965 Method and system for a policy enforcing module 16 1999
* 6,904,523 Method and system for enforcing access to a computing resource using a licensing attribute certificate 28 2002
* 2002/0184,508 Method and system for enforcing access to a computing resource using a licensing attribute certificate 13 2002
7,356,692 Method and system for enforcing access to a computing resource using a licensing attribute certificate 18 2005
* 2005/0262,553 Method and system for enforcing access to a computing resource using a licensing attribute certificate 17 2005
 
Core SDI Incorporated (1)
* 2003/0177,376 Framework for maintaining information security in computer networks 19 2003
 
FELSHER, DAVID (1)
7,181,017 System and method for secure three-party communications 452 2002
 
KABUSHIKI KAISHA TOSHIBA (5)
* 6,539,481 Computer resource assignment of a temporary user from a computer pool of available identifiers 35 1998
* 7,246,372 Portable device and a method for accessing a computer resource of a temporary registered user 2 2002
7,467,213 Portable device and a method for accessing a computer resource of a temporary registered user 0 2007
7,464,399 Portable device and a method for accessing a computer resource of a temporary registered user 0 2007
* 2007/0209,062 PORTABLE DEVICE AND A METHOD FOR ACCESSING A COMPUTER RESOURCE OF A TEMPORARY REGISTERED USER 0 2007
 
Versata Development Group, Inc. (6)
7,958,024 Method and apparatus for processing sales transaction data 3 2001
7,925,513 Framework for processing sales transaction data 9 2001
7,908,304 Method and system for managing distributor information 1 2001
* 2002/0188,535 Method and apparatus for processing sales transaction data 68 2001
* 2002/0169,678 Framework for processing sales transaction data 56 2001
* 7,904,326 Method and apparatus for performing collective validation of credential information 3 2001
 
SALESFORCE.COM, INC. (1)
* 2011/0302,631 SYSTEMS AND METHODS FOR LOGGING INTO AN APPLICATION ON A SECOND DOMAIN FROM A FIRST DOMAIN IN A MULTI-TENANT DATABASE SYSTEM ENVIRONMENT 4 2010
 
CITICORP CREDIT SERVICES, INC. (USA) (1)
7,137,006 Method and system for single sign-on user access to multiple web servers 106 2000
 
PRISM TECHNOLOGIES LLC (2)
8,898,746 Method for managing access to protected computer resources 0 2013
8,661,512 Method for managing access to protected computer resources 0 2013
 
BEA SYSTEMS, INC. (13)
* 2003/0117,437 Portal administration tool 45 2002
* 2004/0167,871 Content mining for virtual content repositories 8 2004
* 2004/0230,917 Systems and methods for navigating a graphical hierarchy 54 2004
* 2005/0251,503 System and method for content and schema versioning 0 2004
* 2005/0228,784 System and method for batch operations in a virtual content repository 2 2004
* 2005/0097,353 Policy analysis tool 23 2004
* 2005/0256,899 System and method for representing hierarchical data structures 1 2004
* 2005/0187,993 Data synchronization 9 2005
* 2005/0256,906 Interface for portal and webserver administration-efficient updates 1 2005
* 2005/0257,172 Interface for filtering for portal and webserver administration 5 2005
* 2005/0257,154 Graphical association of elements for portal and webserver administration 4 2005
* 2007/0073,638 System and method for using soft links to managed content 2 2006
* 2007/0157,297 SYSTEM AND METHOD FOR SERVER SECURITY AND ENTITLEMENT PROCESSING 8 2007
 
Sprint Communications Company L.P. (1)
* 6,131,164 Reverse internet protocol lookup 11 1998
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (44)
* 6,557,032 Data processing system using active tokens and method for controlling such a system 21 1998
* 6,823,513 Workflow distribution process granting to operators with assigned activities access to needed computer resources and withdrawing such access upon the completion of the assigned activity 21 2000
* 2002/0065,917 Method for managing resources on a per user basis for UNIX based systems 2 2000
7,082,455 Method and apparatus of parameter passing of structured data for stored procedures in a content management system 14 2002
7,035,854 Content management system and methodology employing non-transferable access tokens to control data access 59 2002
6,999,966 Content management system and methodology for implementing a complex object using nested/recursive structures 11 2002
6,950,815 Content management system and methodology featuring query conversion capability for efficient searching 14 2002
6,947,948 Version-enabled, multi-typed, multi-targeting referential integrity relational database system and methodology 8 2002
6,944,627 Content management system and methodology employing a tree-based table hierarchy featuring arbitrary information retrieval from different locations in the hierarchy 3 2002
6,938,050 Content management system and methodology employing a tree-based table hierarchy which accomodates opening a dynamically variable number of cursors therefor 12 2002
* 2003/0204,537 Content management system and methodology for implementing a complex object using nested/recursive structures 1 2002
* 2003/0200,256 Method and apparatus of parameter passing of structured data for stored procedures in a content management system 4 2002
* 2003/0200,224 Content management system and methodology employing a tree-based table hierarchy featuring arbitrary information retrieval from different locations in the hierarchy 1 2002
* 2003/0200,218 Content management system and methodology featuring query conversion capability for efficient searching 21 2002
* 2003/0200,219 Version-enabled, multi-typed, multi-targeting referential integrity relational database system and methodology 0 2002
* 2003/0005,333 System and method for access control 6 2002
* 7,216,125 Methods and apparatus for pre-filtered access control in computing systems 18 2002
* 2004/0054,663 Methods and apparatus for pre-filtered access control in computing systems 1 2002
* 7,533,157 Method for delegation of administrative operations in user enrollment tasks 9 2002
* 2004/0122,946 Delegation of administrative operations in user enrollment tasks 7 2002
7,392,246 Method for implementing access control for queries to a content management system 2 2003
* 2004/0250,140 Identifying users of network environments 2 2003
* 2003/0221,012 Resource manager system and method for access control to physical resources in an application hosting environment 17 2003
* 2005/0050,048 Method and system for providing a default role for a user in a remote database 5 2003
7,523,316 Method and system for managing the display of sensitive content in non-trusted environments 5 2003
* 2005/0125,673 Method and system for managing the display of sensitive content in non-trusted environments 36 2003
7,467,386 Parameter passing of data structures where API and corresponding stored procedure are different versions/releases 3 2004
* 2005/0160,432 Parameter passing of data structures where API and corresponding stored procedure are different versions/releases 1 2004
* 7,472,277 User controlled anonymity when evaluating into a role 6 2004
8,230,224 Transmitting security data in multipart communications over a network 1 2005
* 9,129,285 Previewing in live electronic commerce environment 0 2006
* 2007/0179,892 Previewing in live electronic commerce environment 1 2006
* 2010/0042,709 DYNAMIC CONTEXT-SENSITIVE INTEGRATION OF CONTENT INTO A WEB PORTAL APPLICATION 4 2006
* 8,533,168 Automatic policy generation based on role entitlements and identity attributes 2 2007
8,499,339 Authenticating and communicating verifiable authorization between disparate network domains 7 2007
* 2007/0289,004 AUTHENTICATED AND COMMUNICATING VERIFIABLE AUTHORIZATION BETWEEN DISPARATE NETWORK DOMAINS 10 2007
8,161,495 Parameters passing of data structures where API and corresponding stored procedure are different versions/releases 0 2008
7,761,443 Implementing access control for queries to a content management system 5 2008
* 2008/0222,708 IMPLEMENTING ACCESS CONTROL FOR QUERIES TO A CONTENT MANAGEMENT SYSTEM 2 2008
7,818,576 User controlled anonymity when evaluating into a role 1 2008
7,694,148 Method and system for managing the display of sensitive content in non-trusted environments 7 2009
* 2009/0172,408 METHOD AND SYSTEM FOR MANAGING THE DISPLAY OF SENSITIVE CONTENT IN NON-TRUSTED ENVIRONMENTS 2 2009
* 8,359,396 Multiple identity management in an electronic commerce site 1 2011
* 2011/0191,831 Multiple Identity Management in an Electronic Commerce Site 17 2011
 
SAP SE (1)
7,403,989 Facilitating improved workflow 6 2002
 
CAPITAL ONE FINANCIAL CORPORATION (2)
* 2005/0108,394 Grid-based computing to search a network 33 2003
* 2005/0160,276 System and method for a directory secured user account 37 2004
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (2)
* 7,149,806 Data access in a distributed environment 19 2002
* 2003/0163,566 Data access in a distributed environment 5 2002
 
BELLSOUTH INTELLECTUAL PROPERTY CORPORATION (14)
* 6,968,385 Systems and methods for limiting web site access 19 2001
7,664,509 Location blocking service for wireless networks 31 2003
* 2004/0097,243 Location blocking service for wireless networks 80 2003
8,504,705 Systems and methods for limiting web site access 0 2005
* 2006/0099,966 System and method for using location information to execute an action 77 2005
* 2006/0089,134 System and method for using location information to execute an action 63 2005
* 2007/0010,260 System and method for using location information to execute an action 47 2006
* 2007/0042,789 System and method for using location information to execute an action 83 2006
8,639,235 System and method for using location information to execute an action 1 2008
* 2008/0299,957 SYSTEM AND METHOD FOR USING LOCATION INFORMATION TO EXECUTE AN ACTION 16 2008
8,538,456 Surveying wireless device users by location 0 2011
8,402,117 Anonymous location service for wireless networks 2 2011
8,494,501 Identity blocking service from a wireless service provider 4 2012
8,509,813 Location blocking service from a wireless service provider 0 2012
 
CHASE MANHATTAN BANKS USA, NATIONAL ASSOCIATION (1)
7,272,857 Method/system for preventing identity theft or misuse by restricting access 16 2002
 
CISCO TECHNOLOGY, INC. (8)
* 6,934,855 Remote administration of smart cards for secure access systems 21 1999
* 7,010,600 Method and apparatus for managing network resources for externally authenticated users 66 2001
7,690,029 Remote administration of smart cards for secure access systems 5 2005
* 2005/0216,732 Remote administration of smart cards for secure access systems 24 2005
7,882,552 Remote administration of smart cards for secure access systems 3 2005
7,757,273 Remote administration of smart cards for secure access systems 1 2005
* 2007/0169,183 Remote administration of smart cards for secure access systems 9 2005
* 2006/0107,038 Remote administration of smart cards for secure access systems 2 2005
 
EVIDIAN (1)
* 2001/0056,494 Device and method for controlling access to resources 20 2001
 
FUJITSU LIMITED (4)
* 7,165,267 Storing apparatus and password control method 18 1998
* 2005/0208,940 Network service system using a temporary use identifier 8 2004
7,302,581 Storing apparatus and password control method 8 2005
* 2005/0246,765 Storing apparatus and password control method 0 2005
 
J.P. MORGAN CHASE & CO. (1)
7,831,508 System and method for implementing a consolidated application process 1 2000
 
RICOH COMPANY, LTD. (1)
* 2013/0232,239 DATA PROCESSING APPARATUS, COMPUTER-READABLE RECORDING MEDIUM, AND DATA PROCESSING SYSTEM 0 2013
 
InfoAssure, Inc. (4)
7,739,501 Cryptographic key construct 5 2005
7,715,565 Information-centric security 10 2005
7,711,120 Cryptographic key management 4 2005
* 2006/0242,407 Cryptographic key management 26 2005
 
AT&T INTELLECTUAL PROPERTY, INC. (2)
* 7,428,411 Location-based security rules 28 2005
* 2005/0272,445 Location-based security rules 110 2005
 
CUFER ASSET LTD. L.L.C. (4)
7,143,024 Associating identifiers with virtual processes 13 2000
* 7,219,354 Virtualizing super-user privileges for multiple virtual processes 28 2000
RE44723 Regulating file access rates according to file type 0 2007
RE44210 Virtualizing super-user privileges for multiple virtual processes 0 2009
 
ATOS IT SOLUTIONS AND SERVICES GMBH (2)
7,730,093 Method for controlling access to the resources of a data processing system, data processing system, and computer program 0 2002
* 2003/0078,932 Method for controlling access to the resources of a data processing system, data processing system, and computer program 5 2002
 
INTELLECTUAL VENTURES I LLC (4)
7,343,421 Restricting communication of selected processes to a set of specific network addresses 16 2000
7,739,401 Restricting communication of selected processes to a set of specific network addresses 10 2008
8,489,764 Restricting communication of selected processes to a set of specific network addresses 0 2010
* 2011/0238,832 RESTRICTING COMMUNICATION OF SELECTED PROCESSES TO A SET OF SPECIFIC NETWORK ADDRESSES 2 2010
 
EMC CORPORATION (4)
* 8,230,484 Control of resource access privileges via agent authentication 3 2008
* 9,047,323 System and method for reviewing role definitions 0 2011
* 2013/0031,066 System and Method for Reviewing Role Definitions 0 2011
* 9,231,955 Multiparty authorization for controlling resource access 0 2014
 
INVENSYS SYSTEMS, INC. (4)
* 7,707,550 Supervisory process control and manufacturing information system application having an extensible component model 25 2002
* 7,650,607 Supervisory process control and manufacturing information system application having a layered architecture 6 2002
8,230,443 Supervisory process control and manufacturing information system application having a layered architecture 0 2010
8,707,399 Security architecture for a process control platform executing applications 0 2012
 
INTEL CORPORATION (123)
7,356,817 Real-time scheduling of virtual machines 17 2000
7,111,176 Generating isolated bus cycles for isolated execution 8 2000
7,089,418 Managing accesses in a processor for isolated execution 7 2000
7,073,071 Platform and method for generating and utilizing a protected audit log 8 2000
7,013,481 Attestation key memory device and bus 24 2000
7,013,484 Managing a secure environment using a chipset in isolated execution mode 26 2000
6,996,710 Platform and method for issuing and certifying a hardware-protected attestation key 29 2000
6,990,579 Platform and method for remote attestation of a platform 23 2000
6,957,332 Managing a secure platform using a hierarchical executive architecture in isolated execution mode 11 2000
6,760,441 Generating a key hieararchy for use in an isolated execution environment 40 2000
6,754,815 Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set 27 2000
6,678,825 Controlling access to multiple isolated memories in an isolated execution environment 98 2000
6,633,963 Controlling access to multiple memory zones in an isolated execution environment 152 2000
7,085,935 Managing a secure environment using a chipset in isolated execution mode 6 2000
7,082,615 Protecting software environment in isolated execution 33 2000
* 6,941,458 Managing a secure platform using a hierarchical executive architecture in isolated execution mode 11 2000
7,793,111 Mechanism to handle events in a machine with isolated execution 0 2000
7,389,427 Mechanism to secure computer output from software attack using isolated execution 15 2000
6,795,905 Controlling accesses to isolated memory using a memory controller for isolated execution 21 2000
7,215,781 Creation and distribution of a secret value between two devices 1 2000
7,818,808 Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor 25 2000
7,225,441 Mechanism for providing power management through virtualization 51 2000
7,117,376 Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations 24 2000
7,035,963 Method for resolving address space conflicts between a virtual machine monitor and a guest operating system 25 2000
6,907,600 Virtual translation lookaside buffer 80 2000
* 2003/0120,856 Method for resolving address space conflicts between a virtual machine monitor and a guest operating system 5 2000
* 2002/0082,824 Virtual translation lookaside buffer 28 2000
6,769,058 Resetting a processor in an isolated execution environment 7 2000
7,194,634 Attestation key memory device and bus 14 2001
7,096,497 File checking using remote signing authority via a network 13 2001
7,191,440 Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor 64 2001
7,024,555 Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment 25 2001
7,103,771 Connecting a virtual token to a physical token 37 2001
7,308,576 Authenticated code module 3 2001
7,480,806 Multi-token seal and unseal 8 2002
7,631,196 Method and apparatus for loading a trustable operating system 4 2002
7,069,442 System and method for execution of a secured environment initialization instruction 29 2002
7,028,149 System and method for resetting a platform configuration register 46 2002
7,076,669 Method and apparatus for communicating securely with a token 2 2002
7,058,807 Validation of inclusion of a platform within a data center 24 2002
* 2003/0196,088 Method and apparatus for communicating securely with a token 1 2002
7,127,548 Control register access virtualization performance improvement in the virtual-machine architecture 11 2002
7,139,890 Methods and arrangements to interface memory 21 2002
6,820,177 Protected configuration space in a protected environment 9 2002
7,142,674 Method of confirming a secure key exchange 11 2002
* 2003/0233,550 Method of confirming a secure key exchange 2 2002
7,392,415 Sleep protection 2 2002
7,124,327 Control over faults occurring during the operation of guest software in the virtual-machine architecture 19 2002
6,996,748 Handling faults associated with operation of guest software in the virtual-machine architecture 15 2002
7,296,267 System and method for binding virtual machines to hardware contexts 48 2002
7,165,181 System and method for establishing trust without revealing identity 28 2002
7,073,042 Reclaiming existing fields in address translation data structures to extend control over memory accesses 16 2002
* 2004/0117,593 Reclaiming existing fields in address translation data structures to extend control over memory acceses 31 2002
7,318,235 Attestation using both fixed token and portable token 18 2002
7,318,141 Methods and systems to control virtual machines 3 2002
* 2004/0123,288 Methods and systems to manage machine state in virtual machine operations 26 2002
7,900,017 Mechanism for remapping post virtual machine memory pages 2 2002
* 2004/0128,345 Dynamic service registry 55 2002
* 2004/0128,465 Configurable memory bus width 5 2002
7,415,708 Virtual machine management using processor state information 21 2003
* 2004/0268,347 Virtual machine management using processor state information 76 2003
7,424,709 Use of multiple virtual machine monitors to handle privileged events 18 2003
7,287,197 Vectoring an interrupt or exception upon resuming operation of a virtual machine 5 2003
* 2005/0060,703 Vectoring an interrupt or exception upon resuming operation of a virtual machine 0 2003
7,739,521 Method of obscuring cryptographic computations 0 2003
* 2005/0084,098 Method of obscuring cryptographic computations 7 2003
7,237,051 Mechanism to control hardware interrupt acknowledgement in a virtual machine system 14 2003
7,177,967 Chipset support for managing hardware interrupts in a virtual machine system 17 2003
7,020,738 Method for resolving address space conflicts between a virtual machine monitor and a guest operating system 9 2003
* 2005/0080,970 Chipset support for managing hardware interrupts in a virtual machine system 1 2003
* 2005/0080,934 Invalidating translation lookaside buffer entries in a virtual machine (VM) system 15 2003
6,934,817 Controlling access to multiple memory zones in an isolated execution environment 20 2003
7,636,844 Method and system to provide a trusted channel within a computer system for a SIM device 6 2003
* 2005/0108,532 Method and system to provide a trusted channel within a computer system for a SIM device 9 2003
* 2005/0108,534 Providing services to an open platform implementing subscriber identity module (SIM) capabilities 15 2003
* 2005/0108,171 Method and apparatus for implementing subscriber identity module (SIM) capabilities in an open platform 18 2003
8,156,343 Accessing private data about the state of a data processing machine from storage that is publicly accessible 2 2003
8,037,314 Replacing blinded authentication authority 3 2003
7,802,085 Apparatus and method for distributing private keys to an entity with minimal secret, unique information 6 2004
* 2005/0216,920 Use of a virtual machine to emulate a hardware device 22 2004
7,356,735 Providing support for single stepping a virtual machine in a virtual machine environment 6 2004
* 2005/0240,819 Providing support for single stepping a virtual machine in a virtual machine environment 5 2004
7,620,949 Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment 2 2004
* 2005/0240,700 Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment 2 2004
7,490,070 Apparatus and method for proving the denial of a direct proof signature 10 2004
7,366,849 Protected configuration space in a protected environment 5 2004
* 2005/0288,056 System including a wireless wide area network (WWAN) module with an external identity module reader and approach for certifying the WWAN module 7 2004
7,305,592 Support for nested fault in a virtual machine environment 17 2004
* 2006/0005,084 Support for nested faults in a virtual machine environment 1 2004
7,840,962 System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time 3 2004
8,146,078 Timer offsetting mechanism in a virtual machine environment 8 2004
8,924,728 Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information 0 2004
* 2006/0117,181 Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information 22 2004
8,533,777 Mechanism to determine trust of out-of-band management agents 0 2004
7,395,405 Method and apparatus for supporting address translation in a virtual machine environment 11 2005
7,313,669 Virtual translation lookaside buffer 6 2005
7,546,457 System and method for execution of a secured environment initialization instruction 12 2005
* 2005/0188,198 Managing a secure platform using a hierarchical executive architecture in isolated execution mode 6 2005
7,809,957 Trusted platform module for generating sealed data 7 2005
7,302,511 Chipset support for managing hardware interrupts in a virtual machine system 10 2005
7,516,330 Platform and method for establishing provable identities while maintaining privacy 2 2005
7,921,293 Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment 0 2006
8,014,530 Method and apparatus for authenticated, recoverable key distribution with no database secrets 2 2006
7,454,611 System and method for establishing trust without revealing identity 3 2007
* 2007/0113,077 System and Method for Establishing Trust Without Revealing Identity 0 2007
7,836,275 Method and apparatus for supporting address translation in a virtual machine environment 3 2008
8,296,762 Virtual machine management using processor state information 2 2008
8,185,734 System and method for execution of a secured environment initialization instruction 2 2009
7,861,245 Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment 0 2009
8,407,476 Method and apparatus for loading a trustable operating system 0 2009
8,386,788 Method and apparatus for loading a trustable operating system 0 2009
8,639,915 Apparatus and method for distributing private keys to an entity with minimal secret, unique information 0 2010
8,671,275 Mechanism to handle events in a machine with isolated execution 0 2010
8,522,044 Mechanism to handle events in a machine with isolated execution 0 2010
8,543,772 Invalidating translation lookaside buffer entries in a virtual machine (VM) system 2 2010
8,195,914 Mechanism for remapping post virtual machine memory pages 0 2011
9,009,483 Replacing blinded authentication authority 0 2011
8,645,688 System and method for execution of a secured environment initialization instruction 0 2012
9,160,730 Continuous authentication confidence module 0 2013
* 9,137,247 Technologies for secure storage and use of biometric authentication information 0 2013
9,087,000 Accessing private data about the state of a data processing machine from storage that is publicly accessible 1 2013
* 2014/0282,945 TECHNOLOGIES FOR SECURE STORAGE AND USE OF BIOMETRIC AUTHENTICATION INFORMATION 5 2013
8,751,752 Invalidating translation lookaside buffer entries in a virtual machine system 0 2013
 
TOSHIBA TEC KABUSHIKI KAISHA (2)
7,478,421 System and method for role based access control of a document processing device 6 2004
* 2005/0172,151 System and method for role based access control of a document processing device 16 2004
 
SYMANTEC CORPORATION (3)
* 8,239,915 Endpoint management using trust rating data 73 2006
8,726,391 Scheduling malware signature updates in relation to threat awareness and environmental safety 1 2008
* 8,763,076 Endpoint management using trust rating data 1 2012
 
WOODSTOCK SYSTEMS, LLC (3)
* 2005/0066,219 Personal digital server pds 43 2004
8,862,894 Computerized method, program, and apparatus for limited sharing of digital content 1 2010
* 2010/0174,918 Personal Digital Server (PDS) 9 2010
 
InfoPower Corporation (1)
* 2004/0010,710 Method and system for filtering requests to a web site 9 2002
 
INDIVIDUAL NETWORKS, INC. (1)
* 2002/0087,400 Method and system for providing a reward for playing content received over a data network 14 2000
 
WONDERWARE CORPORATION (2)
* 2002/0198,920 Supervisory process control and manufacturing information system application having a layered architecture 24 2002
* 2002/0199,123 Security architecture for a process control platform executing applications 36 2002
 
HONESTY ONLINE, LLC (1)
8,438,622 Methods and apparatus for authorizing access to data 0 2008
 
SYBASE, INC. (4)
8,478,668 Hierarchical entitlement system with integrated inheritance and limit checks 0 2004
* 2005/0203,836 Hierarchical Entitlement System with Integrated Inheritance and Limit Checks 5 2004
7,797,239 Hierarchical entitlement system with integrated inheritance and limit checks 1 2006
* 2007/0011,091 Hierarchical entitlement system with integrated inheritance and limit checks 4 2006
 
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP (3)
* 7,590,630 Managing electronic information 4 2003
* 2005/0131,901 Managing electronic information 6 2003
7,904,476 Computer-implemented method for compressing representation of binary relation 1 2007
 
Micron Technology, Inc. (2)
7,610,611 Prioritized address decoder 2 2003
* 2005/0086,508 Prioritized address decoder 1 2003
 
Teleran Technologies Inc. (2)
* 7,140,035 Rule based security policy enforcement 25 2000
* 2007/0094,707 Rule Based Security Policy Enforcement 6 2006
 
AMAZON TECHNOLOGIES, INC. (1)
* 9,344,427 Facilitating multiple authentications 0 2014
 
NOKIA TECHNOLOGIES OY (2)
7,191,216 System and method for controlling access to downloadable resources 18 2001
* 2003/0065,777 System and method for controlling access to downloadable resources 14 2001
 
J P Morgan Chase Bank (2)
7,392,386 Setuid-filter method for providing secure access to a credentials store for computer systems 1 2004
* 2005/0166,048 Setuid-filter method for providing secure access to a credentials store for computer systems 0 2004
 
JPMORGAN CHASE BANK, N.A. (53)
8,571,975 System and method for sending money via E-mail over the internet 0 1999
7,426,530 System and method for providing customers with seamless entry to a remote server 32 2000
6,867,789 System and method for generating graphical user interfaces 32 2000
7,058,817 System and method for single sign on process for websites with multiple applications and services 60 2000
7,747,866 System and method providing improved error detection related to transmission of data over a communication link 7 2000
7,321,864 System and method for providing funding approval associated with a project based on a document collection 109 2000
7,246,263 System and method for portal infrastructure tracking 16 2001
7,103,576 System for providing cardless payment 39 2001
7,099,850 Methods for providing cardless payment 34 2001
8,438,086 System and method for providing customers with seamless entry to a remote server 0 2001
7,987,501 System and method for single session sign-on 1 2001
7,941,533 System and method for single sign-on session management without central server 6 2002
7,246,324 Method and system for data capture with hidden applets 12 2002
7,689,506 System and method for rapid updating of credit information 17 2002
7,143,174 Method and system for delayed cookie transmission in a client-server architecture 6 2002
7,472,171 Method and system for determining receipt of a delayed cookie in a client-server architecture 16 2002
8,266,437 Electronic vouchers and a system and method for issuing the same 0 2002
7,058,660 System and method for network-based project management 6 2002
7,689,504 System and method for establishing or modifying an account with user selectable terms 39 2002
8,301,493 System and method for providing incentives to consumers to share information 0 2002
7,353,383 System and method for single session sign-on with cryptography 30 2003
8,306,907 System and method for offering risk-based interest rates in a credit instrument 2 2003
7,376,838 Method for controlled and audited access to privileged accounts on computer systems 11 2003
7,421,696 Methods and systems for managing successful completion of a network of processes 1 2004
7,742,997 System and method for management and delivery of content and rules 7 2004
8,190,893 Portable security transaction protocol 6 2004
* 2010/0174,826 Information gathering system and method 3 2004
* 2011/0154,455 Security management framework 1 2005
8,185,877 System and method for testing applications 26 2005
7,756,816 System and method for network-based project management 2 2005
7,783,578 System for providing cardless payment 3 2006
7,461,265 System and method for single sign on process for websites with multiple applications and services 19 2006
7,444,672 System and method for single sign on process for websites with multiple applications and services 22 2006
8,583,926 System and method for anti-phishing authentication 1 2006
8,145,522 System and method for establishing or modifying an account with user selectable terms 8 2006
8,793,490 Systems and methods for multifactor authentication 2 2006
7,966,496 System and method for single sign on process for websites with multiple applications and services 9 2006
8,335,855 System and method for portal infrastructure tracking 1 2007
8,185,940 System and method for providing discriminated content to network users 1 2007
7,685,013 System and method for automatic financial project management 18 2007
8,849,716 System and method for preventing identity theft or misuse by restricting access 0 2007
8,473,735 Systems and methods for managing digital certificates 4 2008
8,590,008 System and method for single sign on process for websites with multiple applications and services 0 2008
8,321,682 System and method for generating and managing administrator passwords 1 2009
8,160,960 System and method for rapid updating of credit information 12 2009
8,732,072 System and method for establishing or modifying an account with user selectable terms 0 2010
* 2010/0179,888 SYSTEM AND METHOD FOR ESTABLISHING OR MODIFYING AN ACCOUNT WITH USER SELECTABLE TERMS 7 2010
8,266,054 System and method for implementing a consolidated application process 0 2012
8,458,070 System and method for providing customers with seamless entry to a remote server 0 2012
8,549,315 System and method for generating and managing administrator passwords 0 2012
9,064,273 System and method for management and delivery of content and rules 0 2013
8,726,011 Systems and methods for managing digital certificates 0 2013
9,240,012 Systems and methods for multifactor authentication 0 2014
 
MICROSOFT TECHNOLOGY LICENSING, LLC (33)
* 7,703,131 Secured distributed impersonation 1 2000
* 2001/0029,607 System and method for application installation management 11 2001
* 7,076,797 Granular authorization for network user sessions 40 2001
* 2003/0070,091 Granular authorization for network user sessions 19 2001
7,401,235 Persistent authorization context based on external authentication 20 2002
* 2003/0212,806 Persistent authorization context based on external authentication 17 2002
* 7,546,633 Role-based authorization management framework 12 2002
* 2004/0083,367 Role-based authorization management framework 23 2002
* 7,353,282 Methods and systems for sharing a network resource with a user without current access 12 2002
7,827,595 Delegated administration of a hosted resource 5 2003
* 2005/0050,354 Delegated administration of a hosted resource 9 2003
* 7,496,761 Method and system for batch task creation and execution 3 2004
* 2006/0075,253 Method and system for batch task creation and execution 4 2004
* 7,945,942 System and methods for exchanging user interface data in a multi-user system 1 2005
* 2007/0016,773 System and method for exchanging user interface data in a multi-user system 3 2005
* 8,060,932 Modular enterprise authorization solution 3 2006
* 2008/0109,898 MODULAR ENTERPRISE AUTHORIZATION SOLUTION 4 2006
7,979,893 Tailored system management interface 4 2007
* 2008/0301,803 Tailored System Management Interface 10 2007
8,032,935 Security synchronization services 0 2007
* 2009/0007,260 Security Synchronization Services 1 2007
* 8,271,536 Multi-tenancy using suite of authorization manager components 12 2008
* 2010/0125,612 MULTI-TENANCY USING SUITE OF AUTHORIZATION MANAGER COMPONENTS 40 2008
* 8,413,210 Credential sharing between multiple client applications 4 2008
* 2010/0146,611 Credential Sharing Between Multiple Client Applications 15 2008
* 8,505,084 Data access programming model for occasionally connected applications 1 2009
* 2010/0257,578 DATA ACCESS PROGRAMMING MODEL FOR OCCASIONALLY CONNECTED APPLICATIONS 19 2009
9,197,417 Hosted application sandbox model 0 2009
* 2010/0274,910 HOSTED APPLICATION SANDBOX MODEL 34 2009
8,533,772 Role-based authorization management framework 15 2009
* 2009/0260,056 Role-Based Authorization Management Framework 8 2009
* 2011/0231,940 CREDENTIAL-BASED ACCESS TO DATA 15 2010
8,631,463 Tailored system management interface 0 2011
 
COURION CORPORATION (3)
8,539,568 Identity map creation 2 2008
8,601,562 Policy enforcement using ESSO 38 2008
* 2009/0205,016 POLICY ENFORCEMENT USING ESSO 45 2008
 
BANK OF AMERICA CORPORATION (2)
* 8,726,340 Apparatus and method for expert decisioning 0 2012
* 2013/0047,201 Apparatus and Method for Expert Decisioning 0 2012
 
Wayport, Inc. (15)
8,417,763 Providing information to a computing device based on known location and user information 6 2004
8,478,887 Providing advertisements to a computing device based on a predetermined criterion of a wireless access point 3 2006
7,840,689 Dynamically modifying the display of a computing device to provide advertisements 6 2006
8,588,130 Distributed network communication system to provide wireless access to a computing device at a reduced rate 1 2006
8,509,246 Method and apparatus for geographic-based communications service 4 2007
8,250,204 Method and apparatus for geographic-based communications service 7 2007
8,095,647 Method and apparatus for geographic-based communications service 8 2007
8,199,733 Method and apparatus for geographic-based communications service 7 2007
* 2008/0049,696 METHOD AND APPARATUS FOR GEOGRAPHIC-BASED COMMUNICATIONS SERVICE 4 2007
8,606,851 Method and apparatus for geographic-based communications service 0 2011
8,631,128 Method and apparatus for geographic-based communications service 0 2012
8,583,723 Receiving location based advertisements on a wireless communication device 0 2012
8,929,915 Providing information to a computing device based on known location and user information 0 2013
8,892,736 Providing an advertisement based on a geographic location of a wireless access point 0 2013
8,990,287 Providing promotion information to a device based on location 0 2013
 
GOOGLE INC. (4)
* 6,665,814 Method and apparatus for providing serialization support for a computer system 30 2000
* 2002/0066,051 Method and apparatus for providing serialization support for a computer system 12 2000
* 7,272,852 Reserve/release control method 5 2004
* 2005/0278,539 Reserve/release control method 0 2004
 
ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE (2)
* 7,290,279 Access control method using token having security attributes in computer system 7 2002
* 2003/0200,436 Access control method using token having security attributes in computer system 7 2002
 
QUALCOMM INCORPORATED (2)
* 8,943,326 Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data 0 2008
* 2009/0193,519 Systems and Methods for Accessing a Tamperproof Storage Device in a Wireless Communication Device Using Biometric Data 0 2008
 
GENERAL ELECTRIC COMPANY (2)
8,332,910 Method and apparatus for selective data control 1 2003
* 2005/0091,393 Method and apparatus for selective data control 5 2003
 
GOOD TECHNOLOGY CORPORATION (1)
* 8,117,344 Global server for authenticating access to remote services 33 2009
 
ALCATEL LUCENT (2)
* 8,069,475 Distributed authentication functionality 2 2005
* 2007/0050,839 Distributed authentication functionality 5 2005
 
BEIJING XIAOMI MOBILE SOFTWARE CO., LTD. (1)
7,366,305 Platform and method for establishing trust without revealing identity 4 2003
 
III HOLDINGS 1, LLC (7)
* 7,207,058 Method and system for transmitting authentication context information 8 2002
* 2004/0128,558 Method and system for transmitting authentication context information 12 2002
7,761,909 Method and system for transmitting authentication context information 0 2007
8,181,231 Method and system for transmitting authentication context information 0 2010
* 2010/0251,343 METHOD AND SYSTEM FOR TRANSMITTING AUTHENTICATION CONTEXT INFORMATION 3 2010
8,607,314 Method and system for transmitting authentication context information 1 2012
9,117,064 Method and system for transmitting authentication context information 0 2013
 
ENTRUST, INC. (1)
* 6,453,353 Role-based navigation of information resources 346 1999
 
EMD Millipore Corporation (4)
* 7,661,127 Instrument access control system 3 2002
* 2004/0093,526 Instrument access control system 19 2002
8,250,636 Instrument access control system 0 2010
* 2010/0235,896 Instrument access control system 2 2010
 
Citibank Development Center, Inc. (3)
8,146,141 Method and system for secure authentication of a user by a host system 7 2004
8,302,172 Methods and systems for secure authentication of a user by a host system 1 2011
8,650,625 Method and system for secure authentication of a user by a host system 0 2012
 
PARAGON TRADE BRANDS, INC. (1)
7,266,839 System and method for providing discriminated content to network users 21 2001
 
FACEBOOK, INC. (10)
* 7,707,627 Leveraging a persistent connection to access a secured service 6 2007
* 8,176,541 Leveraging a persistent connection to access a secured service 4 2010
* 8,689,312 Leveraging a persistent connection to access a secured service 2 2012
* 2012/0260,316 Leveraging a Persistent Connection to Access a Secured Service 1 2012
* 8,769,645 Brokering a connection to access a secured service 2 2012
* 2013/0174,226 LEVERAGING A PERSISTENT CONNECTION TO ACCESS A SECURED SERVICE 1 2012
* 8,887,260 Token-based access control 0 2012
9,197,626 Leveraging a persistent connection to access a secured service 0 2014
* 9,197,627 Leveraging a persistent connection to access a secured service 0 2014
* 2015/0113,611 LEVERAGING A PERSISTENT CONNECTION TO ACCESS A SECURED SERVICE 1 2014
 
ACCESS 360 (4)
* 6,985,955 System and method for provisioning resources to users based on roles, organizational information, attributes and third-party information or authorizations 59 2001
* 6,947,989 System and method for provisioning resources to users based on policies, roles, organizational information, and attributes 69 2001
* 2002/0156,904 System and method for provisioning resources to users based on roles, organizational information, attributes and third-party information or authorizations 22 2001
* 2002/0147,801 System and method for provisioning resources to users based on policies, roles, organizational information, and attributes 48 2001
 
MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. (4)
6,910,132 Secure system and method for accessing files in computers using fingerprints 13 2000
* 2003/0115,327 Method and apparatus for setting up a firewall 10 2002
* 7,379,942 Approval authority registration system and method 0 2004
* 2004/0249,690 Approval authority registration system and method 1 2004
 
McAfee, Inc. (4)
* 6,357,010 System and method for controlling access to documents stored on an internal network 201 1998
* 6,640,307 System and method for controlling access to documents stored on an internal network 102 2000
7,543,329 System and method for controlling access to documents stored on an internal network 9 2003
* 2004/0003,293 System and method for controlling access to documents stored on an internal network 9 2003
* Cited By Examiner