US Patent No: 6,324,647

Number of patents in Portfolio can not be more than 2000

System, method and article of manufacture for security management in a development architecture framework

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A system, method, and article of manufacture are provided for providing security management in a development architecture framework. Unauthorized attempts to access a network are detected and when an unauthorized attempt to access the network is detected, a user is notified. Access from the network is restricted to a separate wide area network. The identities of users of credit cards are verified during transactions carried out over the network. The content of electronic mail communicated over the network is also monitored so that the communication of the electronic mail over the network is prevent when the content thereof being deemed inappropriate. The electronic mail is also encrypted during the communication thereof over the network.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
ACCENTURE GLOBAL SERVICES LIMITEDDUBLIN 4, IE1202

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Bowman-Amuah, Michel K 6426 Peek Vista Cir., Colorado Springs, CO 80918 56 17012

Cited Art Landscape

Patent Info (Count) # Cites Year
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (1)
5,890,133 Method and apparatus for dynamic optimization of business processes managed by a computer system 159 1996
 
ROUND ROCK RESEARCH, LLC (1)
* 5,577,209 Apparatus and method for providing multi-level security for communication among computers and terminals on a network 277 1994
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (1)
5,301,320 Workflow management and control system 239 1991
 
S.F. IP PROPERTIES 33 LLC (1)
* 5,163,098 System for preventing fraudulent use of credit card 109 1990
 
CISCO TECHNOLOGY, INC. (1)
* 5,961,594 Remote node maintenance and management method and system in communication networks using multiprotocol agents 94 1997
 
U.S. PHILIPS CORPORATION (1)
5,953,707 Decision support system for the management of an agile supply chain 483 1997
 
QUARK MEDIA HOUSE B.V. (1)
5,907,704 Hierarchical encapsulation of instantiated objects in a multimedia authoring system including internet accessible objects 400 1996
 
Check Point Software Technologies, Inc. (1)
* 5,987,611 System and methodology for managing internet access on a per application basis for client computers connected to the internet 796 1997
 
TW SECURITY CORP. (1)
* 5,835,722 System to control content and prohibit certain interactive attempts by a person using a personal computer 394 1996
 
GOOGLE INC. (1)
5,721,908 Computer network for WWW server data access over internet 426 1995
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (1)
* 2003/0033,406 Apparatus for and a method of network load testing 37 2002
 
SOLID STATE MEASUREMENTS, INC. (1)
* 2005/0146,348 Method and apparatus for determining the dielectric constant of a low permittivity dielectric on a semiconductor wafer 1 2003
 
TREND MICRO INCORPORATED (2)
7,340,776 Method and system for configuring and scheduling security audits of a computer network 37 2002
* 7,802,301 Spyware scanning and cleaning methods and system 1 2005
 
NEW TECH MACHINERY, INC. (1)
* 2002/0120,841 Dynamic PKI architecture 2 2000
 
PANASONIC CORPORATION (4)
7,685,435 Program development method, program development supporting system, and program installation method 3 2003
* 2004/0153,657 Program development method, program development supporting system, and program installation method 12 2003
* 7,539,312 Program update method and server 2 2007
8,190,912 Program development method, program development supporting system, and program installation method 0 2008
 
Asgent, Inc. (4)
* 7,260,830 Method and apparatus for establishing a security policy, and method and apparatus for supporting establishment of security policy 16 2001
* 2001/0049,793 Method and apparatus for establishing a security policy, and method and apparatus for supporting establishment of security policy 46 2001
7,823,206 Method and apparatus for establishing a security policy, and method and apparatus of supporting establishment of security policy 2 2007
* 2007/0271,593 Method and apparatus for establishing a security policy, and method and apparatus for supporting establishment of security policy 1 2007
 
SONY ELECTRONICS INC. (1)
* 6,973,653 Method for utilizing resource characterizations to optimize performance in an electronic device 7 2000
 
VIG ACQUISITIONS LTD., L.L.C. (4)
7,480,715 System and method for performing a predictive threat assessment based on risk factors 6 2003
7,016,813 Method and process for configuring a premises for monitoring 9 2004
* 2005/0021,309 Method and process for configuring a premises for monitoring 26 2004
7,933,989 Predictive threat assessment 2 2009
 
ORACLE INTERNATIONAL CORPORATION (2)
* 9,020,930 Project management system with geographic data 0 2012
* 2014/0032,530 PROJECT MANAGEMENT SYSTEM WITH GEOGRAPHIC DATA 0 2012
 
APPLE INC. (1)
* 8,682,706 Techniques for temporarily holding project stages 0 2007
 
OLIVISTAR LLC (2)
7,944,469 System and method for using self-learning rules to enable adaptive security monitoring 6 2006
* 2006/0195,569 System and method for using self-learning rules to enable adaptive security monitoring 53 2006
 
Sprint Communications Company L.P. (13)
* 2007/0276,674 Defining and sizing feasible approaches to business needs within an integrated development process 25 2003
8,538,767 Method for discovering functional and system requirements in an integrated development process 0 2003
7,930,201 EDP portal cross-process integrated view 14 2003
7,849,438 Enterprise software development process for outsourced developers 29 2004
7,801,759 Concept selection tool and process 4 2004
7,774,743 Quality index for quality assurance in software development 30 2005
7,742,939 Visibility index for quality assurance in software development 4 2005
8,108,232 System and method for project contract management 2 2005
8,484,065 Small enhancement process workflow manager 1 2005
8,005,706 Method for identifying risks for dependent projects based on an enhanced telecom operations map 6 2007
8,000,992 System and method for project management plan workbook 3 2007
8,589,203 Project pipeline risk management system and methods for updating project resource distributions based on risk exposure level changes 1 2009
* 8,335,706 Program management for indeterminate scope initiatives 2 2009
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (35)
7,574,740 Method and system for intrusion detection in a computer network 47 2000
7,162,649 Method and apparatus for network assessment and authentication 52 2000
* 6,907,531 Method and system for identifying, fixing, and updating security vulnerabilities 32 2000
7,178,166 Vulnerability assessment and authentication of a computer by a local scanner 201 2000
7,130,466 System and method for compiling images from a database and comparing the compiled images with known images 19 2000
7,921,459 System and method for managing security events on a network 20 2001
7,237,264 System and method for preventing network misuse 94 2001
7,146,305 Analytical virtual machine 54 2001
* 7,275,048 Product support of computer-related products using intelligent agents 17 2001
7,673,137 System and method for the managed security control of processes on a computer system 8 2003
7,913,303 Method and system for dynamically protecting a computer system from attack 31 2003
* 7,461,158 System and method for controlling access rights to network resources 52 2003
7,519,960 Method and system for debugging business process flow 23 2003
7,657,938 Method and system for protecting computer networks by altering unwanted network data traffic 7 2004
7,647,630 Associating security information with information objects in a data processing system 7 2005
7,512,792 Reference monitor method for enforcing information flow policies 9 2005
* 2007/0143,604 Reference monitor system and method for enforcing information flow policies 11 2005
* 2007/0143,601 System and method for authorizing information flows 19 2005
7,634,800 Method and apparatus for network assessment and authentication 80 2006
7,934,254 Method and apparatus for providing network and computer system security 12 2006
7,499,590 System and method for compiling images from a database and comparing the compiled images with known images 16 2006
7,657,419 Analytical virtual machine 28 2006
8,006,243 Method and apparatus for remote installation of network drivers and software 5 2006
* 8,006,303 System, method and program product for intrusion protection of a network 1 2007
* 7,712,138 Method and system for configuring and scheduling security audits of a computer network 20 2007
7,565,549 System and method for the managed security control of processes on a computer system 10 2007
9,027,121 Method and system for creating a record for one or more computer security incidents 0 2007
7,607,124 Method for debugging a business process flow 22 2007
7,770,225 Method and apparatus for auditing network security 8 2008
8,024,565 Authorizing information flows 5 2008
7,975,295 Associating security information with information objects 3 2008
* 2008/0229,412 Associating Security Information with Information Objects 3 2008
* 2008/0229,413 Authorizing Information Flows 5 2008
7,793,100 Reference monitor for enforcing information flow policies 7 2009
8,527,754 Authorizing information flows based on a sensitivity of an information object 0 2011
 
SAP SE (15)
* 2003/0130,749 Multi-purpose configuration model 3 2002
7,133,878 External evaluation processes 0 2002
* 7,031,787 Change management 25 2002
* 2003/0182,145 Change management 2 2002
8,180,732 Distributing data in master data management systems 1 2003
7,509,326 Central master data management 27 2003
7,236,973 Collaborative master data management system for identifying similar objects including identical and non-identical attributes 23 2003
* 2004/0103,182 Distribution in master data management 19 2003
8,499,036 Collaborative design process 0 2003
8,438,238 Master data access 3 2003
* 2004/0117,377 Master data access 29 2003
7,930,149 Versioning of elements in a configuration model 7 2003
7,272,776 Master data quality 1 2003
8,061,604 System and method of master data management using RFID technology 1 2003
8,117,157 External evaluation processes 0 2006
 
VIVINT, INC. (6)
7,627,665 System and method for providing configurable security monitoring utilizing an integrated information system 21 2001
6,748,343 Method and process for configuring a premises for monitoring 22 2001
8,392,552 System and method for providing configurable security monitoring utilizing an integrated information system 3 2002
RE43598 Method and process for configuring a premises for monitoring 4 2008
RE45649 Method and process for configuring a premises for monitoring 0 2012
8,700,769 System and method for providing configurable security monitoring utilizing an integrated information system 1 2012
 
CISCO TECHNOLOGY, INC. (2)
* 6,985,920 Method and system for determining intra-session event correlation across network address translation devices 28 2003
* 2004/0260,763 Method and system for determining intra-session event correlation across network address translation devices 2 2003
 
AIRDEFENSE, INC. (25)
7,383,577 Method and system for encrypted network management and intrusion detection 29 2002
7,086,089 Systems and methods for network security 53 2002
7,058,796 Method and system for actively defending a wireless LAN against attacks 44 2002
7,042,852 System and method for wireless LAN dynamic channel change with honeypot trap 43 2002
* 2004/0203,764 Methods and systems for identifying nodes and mapping their locations 22 2002
* 2003/0233,567 Method and system for actively defending a wireless LAN against attacks 34 2002
* 2003/0219,008 System and method for wireless lan dynamic channel change with honeypot trap 51 2002
* 2003/0217,283 Method and system for encrypted network management and intrusion detection 51 2002
7,277,404 System and method for sensing wireless LAN activity 43 2003
7,359,676 Systems and methods for adaptively scanning for wireless communications 39 2003
7,322,044 Systems and methods for automated network policy exception detection and correction 135 2003
7,532,895 Systems and methods for adaptive location tracking 17 2004
7,522,908 Systems and methods for wireless network site survey 29 2004
7,355,996 Systems and methods for adaptive monitoring with bandwidth constraints 13 2004
7,324,804 Systems and methods for dynamic sensor discovery and selection 21 2004
* 2005/0174,961 Systems and methods for adaptive monitoring with bandwidth constraints 20 2004
8,196,199 Personal wireless monitoring agent 82 2005
7,577,424 Systems and methods for wireless vulnerability analysis 4 2005
7,715,800 Systems and methods for wireless intrusion detection using spectral analysis 11 2006
7,526,808 Method and system for actively defending a wireless LAN against attacks 5 2006
7,971,251 Systems and methods for wireless security using distributed collaboration of wireless clients 4 2006
7,970,013 Systems and methods for wireless network content filtering 7 2006
8,281,392 Methods and systems for wired equivalent privacy and Wi-Fi protected access protection 0 2006
7,779,476 Active defense against wireless intruders 1 2006
8,060,939 Method and system for securing wireless local area networks 2 2008
 
SECURE COMPUTING CORPORATION (29)
7,458,098 Systems and methods for enhancing electronic communication security 74 2002
7,124,438 Systems and methods for anomaly detection in patterns of monitored communications 59 2002
6,941,467 Systems and methods for adaptive message interrogation through multiple queues 68 2002
7,213,260 Systems and methods for upstream threat pushback 78 2003
7,694,128 Systems and methods for secure communication delivery 32 2003
8,132,250 Message profiling systems and methods 29 2005
7,089,590 Systems and methods for adaptive message interrogation through multiple queues 28 2005
7,225,466 Systems and methods for message threat management 44 2006
7,903,549 Content-based policy compliance systems and methods 27 2006
8,578,480 Systems and methods for identifying potentially malicious messages 12 2006
7,870,203 Methods and systems for exposing messaging reputation to an end user 43 2006
7,693,947 Systems and methods for graphically displaying messaging traffic 39 2006
7,779,466 Systems and methods for anomaly detection in patterns of monitored communications 25 2006
7,519,994 Systems and methods for adaptive message interrogation through multiple queues 29 2006
8,069,481 Systems and methods for message threat management 30 2006
* 8,042,181 Systems and methods for message threat management 29 2006
8,763,114 Detecting image spam 1 2007
8,561,167 Web reputation scoring 15 2007
8,214,497 Multi-dimensional reputation scoring 22 2007
8,179,798 Reputation based connection throttling 14 2007
7,949,716 Correlation and analysis of entity attributes 20 2007
7,937,480 Aggregation of reputation data 24 2007
7,779,156 Reputation based load balancing 21 2007
8,042,149 Systems and methods for message threat management 26 2007
8,185,930 Adjusting filter or classification control settings 28 2007
8,045,458 Prioritizing network traffic 38 2007
8,635,690 Reputation based message processing 6 2008
8,160,975 Granular support vector machine with random granularity 16 2008
8,589,503 Prioritizing network traffic 5 2009
 
TERADATA US, INC. (1)
* 7,131,142 Intelligent agents used to provide agent community security 7 2000
 
CITRIX GATEWAYS, INC. (1)
8,559,449 Systems and methods for providing a VPN solution 3 2011
 
InfoAssure, Inc. (4)
7,739,501 Cryptographic key construct 4 2005
7,715,565 Information-centric security 9 2005
7,711,120 Cryptographic key management 4 2005
* 2006/0242,407 Cryptographic key management 22 2005
 
PALO ALTO NETWORKS, INC. (1)
7,370,360 Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine 77 2002
 
ACCENTURE GLOBAL SERVICES LIMITED (32)
* 6,615,166 Prioritizing components of a network framework required for implementation of technology 429 1999
7,139,999 Development architecture framework 235 1999
6,662,357 Managing information in an integrated development architecture framework 303 1999
7,415,509 Operations architectures for netcentric computing systems 20 2000
7,403,946 Data management for netcentric computing systems 30 2000
7,068,680 Communication service architectures for netcentric computing systems 39 2000
6,988,249 Presentation service architectures for netcentric computing systems 14 2000
6,874,010 Base service architectures for netcentric computing systems 96 2000
7,020,697 Architectures for netcentric computing systems 268 2000
* 7,321,886 Rapid knowledge transfer among workers 26 2003
* 2005/0027,696 Rapid knowledge transfer among workers 42 2003
7,734,687 Environment service architectures for netcentric computing systems 1 2005
7,467,198 Architectures for netcentric computing systems 106 2005
7,809,671 Rapid knowledge transfer among workers 5 2007
8,412,562 Retail high performance capability assessment 0 2008
8,078,485 Postal, freight, and logistics industry high performance capability assessment 21 2008
8,204,779 Revenue asset high performance capability assessment 7 2008
8,893,035 Method, system and graphical user interface for configuring a simulator to simulate a plurality of devices 0 2008
8,825,462 Method and system for simulating a plurality of devices 0 2008
* 2010/0070,909 METHOD AND SYSTEM FOR SIMULATING A PLURALITY OF DEVICES 2 2008
8,781,882 Automotive industry high performance capability assessment 4 2008
8,214,238 Consumer goods and services high performance capability assessment 14 2009
8,095,405 Freight and logistics high performance capability assessment 0 2009
8,112,343 Capital markets high performance capability assessment 6 2009
8,239,246 Health and life sciences payer high performance capability assessment 1 2009
8,355,926 Health and life sciences medicaid high performance capability assessment 0 2010
8,880,422 Energy high performance capability assessment 0 2010
8,311,863 Utility high performance capability assessment 11 2010
8,442,857 Pulp and paper high performance capability assessment 0 2010
8,332,262 Chemical high performance capability assessment 0 2010
8,069,134 Rapid knowledge transfer among workers 4 2010
8,224,767 Rapid knowledge transfer among workers 2 2011
 
ALLIED AFFILIATED FUNDING, L.P. (3)
* 7,127,743 Comprehensive security structure platform for network managers 81 2000
7,877,804 Comprehensive security structure platform for network managers 3 2006
* 2007/0234,426 COMPREHENSIVE SECURITY STRUCTURE PLATFORM FOR NETWORK MANAGERS 43 2006
 
mVerify Corporation (2)
* 7,339,891 Method and system for evaluating wireless applications 11 2003
* 2003/0156,549 Method and system for evaluating wireless applications 9 2003
 
Cipher Trust, Inc. (1)
7,096,498 Systems and methods for message threat management 86 2003
 
SAP AG (5)
* 2003/0182,167 Goal management 5 2002
* 2005/0091,179 Collaborative design process 13 2003
* 2005/0149,474 Master data entry 1 2003
* 2005/0144,552 Master data quality 5 2003
* 2007/0038,686 External evaluation processes 1 2006
 
EMC CORPORATION (1)
* 7,203,925 Graphical compiler 6 2001
 
RED HAT, INC. (1)
* 2012/0090,025 SYSTEMS AND METHODS FOR DETECTION OF MALICIOUS SOFTWARE PACKAGES 3 2010
 
CLEARWIRE IP HOLDINGS LLC (2)
8,453,234 Centralized security management system 1 2006
* 2008/0127,337 CENTRALIZED SECURITY MANAGEMENT SYSTEM 4 2006
 
SYMANTEC CORPORATION (2)
* 8,713,687 Methods and systems for enabling community-tested security features for legacy applications 0 2008
* 8,805,995 Capturing data relating to a threat 0 2009
 
ANGEL SECURE NETWORKS, INC. (2)
9,058,482 Controlling user access to electronic resources without password 0 2012
8,930,717 Secure processing module and method for making the same 0 2012
 
FMR LLC (5)
8,180,873 Detecting fraudulent activity 2 2006
8,145,560 Detecting fraudulent activity on a network 1 2006
7,856,494 Detecting and interdicting fraudulent activity on a network 8 2006
* 2008/0114,883 Unifying User Sessions on a Network 3 2006
* 2008/0114,886 Detecting and Interdicting Fraudulent Activity on a Network 4 2006
 
SYBASE, INC. (2)
7,844,829 Secured database system with built-in antivirus protection 20 2006
* 2007/0168,678 Secured Database System with Built-in Antivirus Protection 7 2006
 
COMPUWARE CORPORATION (1)
* 6,519,763 Time management and task completion and prediction software 157 1999
 
WHITE CYBER KNIGHT LTD. (2)
* 2007/0143,849 Method and a software system for end-to-end security assessment for security and CIP professionals 4 2005
8,392,999 Apparatus and methods for assessing and maintaining security of a computerized system under development 0 2010
 
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP (2)
* 7,647,631 Automated user interaction in application assessment 4 2004
* 2005/0132,232 Automated user interaction in application assessment 6 2004
 
XEROX CORPORATION (2)
* 7,395,254 Method for dynamic knowledge capturing in production printing workflow domain 0 2005
* 2006/0242,097 Method for dynamic knowledge capturing in production printing workflow domain 4 2005
 
AMAZON TECHNOLOGIES, INC. (2)
* 8,639,983 Self-service testing 0 2010
9,053,084 Self-service testing 0 2013
 
ARBOR NETWORKS, INC. (1)
* 7,970,886 Detecting and preventing undesirable network traffic from being sourced out of a network domain 3 2000
 
NOKIA TECHNOLOGIES OY (2)
* 7,228,331 User oriented penalty count random rejection of electronic messages 5 2004
* 2006/0031,507 User oriented penalty count random rejection 0 2004
 
Telos Corporation (8)
6,901,346 System, method and medium for certifying and accrediting requirements compliance 33 2001
6,993,448 System, method and medium for certifying and accrediting requirements compliance 17 2001
7,380,270 Enhanced system, method and medium for certifying and accrediting requirements compliance 25 2001
6,983,221 Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing robust risk assessment model 14 2002
6,980,927 Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment 31 2002
* 2004/0103,309 Enhanced system, method and medium for certifying and accrediting requirements complianceutilizing threat vulnerability feed 25 2002
* 2004/0102,923 Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment 13 2002
* 2004/0102,922 Enhanced system, method and medium for certifying and accrediting requirements complianceutilizing robust risk assessment model 10 2002
 
NEC CORPORATION (1)
* 7,610,625 Program control system, program control method and information control program 1 2002
 
ANGEL SECURE NETWORKS (1)
* 2012/0260,105 SYSTEM AND METHOD FOR DEFENDING AGAINST REVERSE ENGINEERING OF SOFTWARE, FIRMWARE AND HARDWARE 1 2010
 
SEARETE LLC (1)
* 2006/0288,225 User-centric question and answer for authentication and security 6 2005
 
VIAVI SOLUTIONS INC. (1)
* 6,701,342 Method and apparatus for processing quality of service measurement data to assess a degree of compliance of internet services with service level agreements 112 2000
 
STRAGENT, LLC (3)
8,204,945 Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail 6 2008
8,272,060 Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses 2 2010
8,166,549 Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses 0 2010
 
MICROSOFT TECHNOLOGY LICENSING, LLC (2)
* 8,037,109 Generation of repeatable synthetic data 0 2003
* 2004/0267,773 Generation of repeatable synthetic data 1 2003
 
Garmin AT, Inc. (1)
* 6,542,810 Multisource target correlation 27 2001
 
GOOGLE INC. (1)
7,290,278 Identity based service system 25 2003
 
ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE (1)
* 2006/0129,810 Method and apparatus for evaluating security of subscriber network 20 2005
 
UBS Financial Services, Inc. (1)
* 2003/0191,703 Method and system for providing interested party access to aggregated accounts information 57 2002
 
MERCURY KINGDOM ASSETS LIMITED (1)
7,370,270 XML schema evolution 6 2002
 
A-T SOLUTIONS, INC. (4)
* 8,484,066 System and method for risk detection reporting and infrastructure 3 2004
* 2005/0021,360 System and method for risk detection reporting and infrastructure 36 2004
8,812,343 System and method for risk detection reporting and infrastructure 0 2013
9,177,279 System and method for risk detection reporting and infrastructure 0 2014
 
COMPUTER ASSOCIATES THINK, INC. (2)
* 7,788,723 Method and apparatus for identifying computer vulnerabilities using exploit probes and remote scanning 12 2005
* 2006/0265,750 Method and apparatus for providing computer security 35 2005
 
HONEYWELL INTERNATIONAL INC. (2)
* 7,483,757 Control system migration 3 2005
* 2007/0021,852 Control system migration 2 2005
 
GEORGE P. JOHNSON COMPANY (1)
* 7,010,530 Event management system 10 2001
 
GATEWAY, INC. (1)
* 2008/0012,935 Inappropriate content detection and distribution prevention for wireless cameras/camcorders with e-mail capabilities and camera phones 4 2005
 
CAYMAS SYSTEMS, INC. (1)
7,861,087 Systems and methods for state signing of internet resources 0 2007
 
THE BOEING COMPANY (7)
8,056,114 Implementing access control policies across dissimilar access control platforms 2 2005
7,921,452 Defining consistent access control policies 23 2005
* 2007/0056,019 Implementing access control policies across dissimilar access control platforms 38 2005
* 2007/0056,018 Defining consistent access control policies 15 2005
* 2008/0294,505 METHODS AND SYSTEMS FOR TASK ASSESSMENT MANAGEMENT 2 2007
* 2009/0119,746 GLOBAL POLICY APPARATUS AND RELATED METHODS 3 2008
8,271,418 Checking rule and policy representation 1 2009
 
CITRIX SYSTEMS, INC. (52)
7,617,531 Inferencing data types of message components 18 2004
7,827,139 Methods and apparatus for sharing graphical screen data in a bandwidth-adaptive manner 6 2004
7,680,885 Methods and apparatus for synchronization of data set representations in a bandwidth-adaptive manner 4 2004
8,145,777 Method and system for real-time seeking during playback of remote presentation protocols 3 2005
8,443,040 Method and system for synchronizing presentation of a dynamic data set to a plurality of nodes 2 2005
8,739,274 Method and device for performing integrated caching in a data communication network 0 2005
9,219,579 Systems and methods for client-side application-aware prioritization of network communications 0 2005
8,914,522 Systems and methods for facilitating a peer to peer route via a gateway 0 2005
8,363,650 Method and systems for routing packets from a gateway to an endpoint 7 2005
8,291,119 Method and systems for securing remote access to private networks 7 2005
8,191,008 Simulating multi-monitor functionality in a single monitor environment 2 2005
7,924,884 Performance logging using relative differentials and skip recording 6 2005
8,954,595 Systems and methods for providing client-side accelerated access to remote applications via TCP buffering 1 2005
8,706,877 Systems and methods for providing client-side dynamic redirection to bypass an intermediary 1 2005
8,700,695 Systems and methods for providing client-side accelerated access to remote applications via TCP pooling 0 2005
8,549,149 Systems and methods for providing client-side accelerated access to remote applications via TCP multiplexing 2 2005
8,495,305 Method and device for performing caching of dynamically generated objects in a data communication network 6 2005
8,301,839 System and method for performing granular invalidation of cached dynamically generated objects in a data communication network 0 2005
8,255,456 System and method for performing flash caching of dynamically generated objects in a data communication network 7 2005
7,810,089 Systems and methods for automatic installation and execution of a client-side acceleration program 23 2005
8,677,252 Systems and methods for displaying to a presenter visual feedback corresponding to visual changes received by viewers 0 2006
7,747,953 Methods and systems for receiving feedback from a scalable number of participants of an on-line presentation 2 2006
7,831,728 Methods and systems for real-time seeking during real-time playback of a presentation layer protocol data stream 2 2006
8,701,010 Systems and methods of using the refresh button to determine freshness policy 0 2007
8,504,775 Systems and methods of prefreshening cached objects based on user's current web page 31 2007
8,103,783 Systems and methods of providing security and reliability to proxy caches 17 2007
8,037,126 Systems and methods of dynamically checking freshness of cached objects based on link status 2 2007
8,886,822 Systems and methods for accelerating delivery of a computing environment to a remote user 1 2007
8,275,829 Systems and methods of prefetching objects for caching using QoS 6 2009
8,011,009 Inferencing data types of message components 0 2009
8,589,579 Systems and methods for real-time endpoint application flow control with network structure component 1 2009
8,935,316 Methods and systems for in-session playback on a local machine of remotely-stored and real time presentation layer protocol data 0 2009
8,296,441 Methods and systems for joining a real-time session of presentation layer protocol data 1 2009
8,200,828 Systems and methods for single stack shadowing 0 2009
8,364,785 Systems and methods for domain name resolution interception caching 40 2009
8,422,851 System and methods for automatic time-warped playback in rendering a recorded computer session 0 2010
8,375,087 Methods and apparatus for synchronization of data set representations in a bandwidth-adaptive manner 0 2010
8,725,791 Methods and systems for providing a consistent profile to overlapping user sessions 0 2010
8,634,420 Systems and methods for communicating a lossy protocol via a lossless protocol 3 2010
8,261,057 System and method for establishing a virtual private network 12 2010
9,071,526 Systems and methods for platform rate limiting 0 2010
8,615,583 Systems and methods of revalidating cached objects in parallel with request for object 5 2010
8,351,333 Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements 16 2010
8,856,777 Systems and methods for automatic installation and execution of a client-side acceleration program 0 2010
8,499,057 System and method for performing flash crowd caching of dynamically generated objects in a data communication network 6 2011
8,695,084 Inferencing data types of message components 0 2011
8,615,159 Methods and systems for cataloging text in a recorded session 1 2011
8,848,710 System and method for performing flash caching of dynamically generated objects in a data communication network 0 2012
8,726,006 System and method for establishing a virtual private network 0 2012
8,892,778 Method and systems for securing remote access to private networks 0 2012
8,897,299 Method and systems for routing packets from a gateway to an endpoint 0 2013
8,788,581 Method and device for performing caching of dynamically generated objects in a data communication network 0 2013
 
MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. (2)
* 2007/0217,614 Program update method and server 7 2007
* 2009/0037,721 PROGRAM DEVELOPMENT METHOD, PROGRAM DEVELOPMENT SUPPORTING SYSTEM, AND PROGRAM INSTALLATION METHOD 3 2008
 
McAfee, Inc. (13)
* 7,308,702 Locally adaptable central security management in a heterogeneous network environment 74 2000
* 6,775,780 Detecting malicious software by analyzing patterns of system calls generated during emulation 101 2000
* 6,546,493 System, method and computer program product for risk assessment scanning based on detected anomalous events 163 2001
* 6,742,128 Threat assessment orchestrator system and method 131 2002
* 8,181,222 Locally adaptable central security management in a heterogeneous network environment 8 2007
8,578,051 Reputation based load balancing 4 2010
8,621,638 Systems and methods for classification of messaging entities 6 2011
8,549,611 Systems and methods for classification of messaging entities 12 2011
8,631,495 Systems and methods for message threat management 12 2011
8,606,910 Prioritizing network traffic 4 2011
8,621,559 Adjusting filter or classification control settings 5 2012
9,009,321 Multi-dimensional reputation scoring 0 2012
8,762,537 Multi-dimensional reputation scoring 1 2012
* Cited By Examiner