US Patent No: 6,324,647

Number of patents in Portfolio can not be more than 2000

System, method and article of manufacture for security management in a development architecture framework

2 Status Updates

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A system, method, and article of manufacture are provided for providing security management in a development architecture framework. Unauthorized attempts to access a network are detected and when an unauthorized attempt to access the network is detected, a user is notified. Access from the network is restricted to a separate wide area network. The identities of users of credit cards are verified during transactions carried out over the network. The content of electronic mail communicated over the network is also monitored so that the communication of the electronic mail over the network is prevent when the content thereof being deemed inappropriate. The electronic mail is also encrypted during the communication thereof over the network.

Loading the Abstract Image... loading....

First Claim

See full text

all claims..

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
ACCENTURE GLOBAL SERVICES LIMITEDDUBLIN 4, IE1074

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Bowman-Amuah, Michel K Colorado Springs, CO 60 15091

Cited Art Landscape

Patent Info (Count) # Cites Year
 
CHECK POINT SOFTWARE TECHNOLOGIES, INC. (1)
* 5,987,611 System and methodology for managing internet access on a per application basis for client computers connected to the internet 701 1997
 
CISCO TECHNOLOGY, INC. (1)
* 5,961,594 Remote node maintenance and management method and system in communication networks using multiprotocol agents 91 1997
 
GOOGLE INC. (1)
5,721,908 Computer network for WWW server data access over internet 388 1995
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (1)
5,301,320 Workflow management and control system 229 1991
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (1)
5,890,133 Method and apparatus for dynamic optimization of business processes managed by a computer system 155 1996
 
QUARK MEDIA HOUSE B.V. (1)
5,907,704 Hierarchical encapsulation of instantiated objects in a multimedia authoring system including internet accessible objects 378 1996
 
ROUND ROCK RESEARCH, LLC (1)
* 5,577,209 Apparatus and method for providing multi-level security for communication among computers and terminals on a network 269 1994
 
S.F. IP PROPERTIES 33 LLC (1)
* 5,163,098 System for preventing fraudulent use of credit card 108 1990
 
TW SECURITY CORP. (1)
* 5,835,722 System to control content and prohibit certain interactive attempts by a person using a personal computer 316 1996
 
U.S. PHILIPS CORPORATION (1)
5,953,707 Decision support system for the management of an agile supply chain 465 1997
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
CITRIX SYSTEMS, INC. (47)
7,617,531 Inferencing data types of message components 16 2004
7,827,139 Methods and apparatus for sharing graphical screen data in a bandwidth-adaptive manner 4 2004
7,680,885 Methods and apparatus for synchronization of data set representations in a bandwidth-adaptive manner 2 2004
8,145,777 Method and system for real-time seeking during playback of remote presentation protocols 3 2005
8,443,040 Method and system for synchronizing presentation of a dynamic data set to a plurality of nodes 2 2005
8,739,274 Method and device for performing integrated caching in a data communication network 0 2005
8,363,650 Method and systems for routing packets from a gateway to an endpoint 0 2005
8,291,119 Method and systems for securing remote access to private networks 4 2005
8,191,008 Simulating multi-monitor functionality in a single monitor environment 2 2005
7,924,884 Performance logging using relative differentials and skip recording 4 2005
8,706,877 Systems and methods for providing client-side dynamic redirection to bypass an intermediary 0 2005
8,700,695 Systems and methods for providing client-side accelerated access to remote applications via TCP pooling 0 2005
8,549,149 Systems and methods for providing client-side accelerated access to remote applications via TCP multiplexing 0 2005
8,495,305 Method and device for performing caching of dynamically generated objects in a data communication network 4 2005
8,301,839 System and method for performing granular invalidation of cached dynamically generated objects in a data communication network 0 2005
8,255,456 System and method for performing flash caching of dynamically generated objects in a data communication network 4 2005
7,810,089 Systems and methods for automatic installation and execution of a client-side acceleration program 15 2005
8,677,252 Systems and methods for displaying to a presenter visual feedback corresponding to visual changes received by viewers 0 2006
7,747,953 Methods and systems for receiving feedback from a scalable number of participants of an on-line presentation 2 2006
7,831,728 Methods and systems for real-time seeking during real-time playback of a presentation layer protocol data stream 1 2006
8,701,010 Systems and methods of using the refresh button to determine freshness policy 0 2007
8,504,775 Systems and methods of prefreshening cached objects based on user's current web page 13 2007
8,103,783 Systems and methods of providing security and reliability to proxy caches 12 2007
8,037,126 Systems and methods of dynamically checking freshness of cached objects based on link status 1 2007
8,886,822 Systems and methods for accelerating delivery of a computing environment to a remote user 0 2007
8,275,829 Systems and methods of prefetching objects for caching using QoS 0 2009
8,011,009 Inferencing data types of message components 0 2009
8,589,579 Systems and methods for real-time endpoint application flow control with network structure component 1 2009
8,296,441 Methods and systems for joining a real-time session of presentation layer protocol data 1 2009
8,200,828 Systems and methods for single stack shadowing 0 2009
8,364,785 Systems and methods for domain name resolution interception caching 22 2009
8,422,851 System and methods for automatic time-warped playback in rendering a recorded computer session 0 2010
8,375,087 Methods and apparatus for synchronization of data set representations in a bandwidth-adaptive manner 0 2010
8,725,791 Methods and systems for providing a consistent profile to overlapping user sessions 0 2010
8,634,420 Systems and methods for communicating a lossy protocol via a lossless protocol 1 2010
8,261,057 System and method for establishing a virtual private network 9 2010
8,615,583 Systems and methods of revalidating cached objects in parallel with request for object 1 2010
8,351,333 Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements 6 2010
8,856,777 Systems and methods for automatic installation and execution of a client-side acceleration program 0 2010
8,499,057 System and method for performing flash crowd caching of dynamically generated objects in a data communication network 3 2011
8,695,084 Inferencing data types of message components 0 2011
8,615,159 Methods and systems for cataloging text in a recorded session 0 2011
8,848,710 System and method for performing flash caching of dynamically generated objects in a data communication network 0 2012
8,726,006 System and method for establishing a virtual private network 0 2012
8,892,778 Method and systems for securing remote access to private networks 0 2012
8,897,299 Method and systems for routing packets from a gateway to an endpoint 0 2013
8,788,581 Method and device for performing caching of dynamically generated objects in a data communication network 0 2013
 
ACCENTURE GLOBAL SERVICES LIMITED (30)
* 6,615,166 Prioritizing components of a network framework required for implementation of technology 385 1999
7,139,999 Development architecture framework 211 1999
6,662,357 Managing information in an integrated development architecture framework 268 1999
7,415,509 Operations architectures for netcentric computing systems 19 2000
7,403,946 Data management for netcentric computing systems 22 2000
7,068,680 Communication service architectures for netcentric computing systems 31 2000
6,988,249 Presentation service architectures for netcentric computing systems 13 2000
6,874,010 Base service architectures for netcentric computing systems 94 2000
7,020,697 Architectures for netcentric computing systems 226 2000
* 7,321,886 Rapid knowledge transfer among workers 22 2003
7,734,687 Environment service architectures for netcentric computing systems 0 2005
7,467,198 Architectures for netcentric computing systems 70 2005
7,809,671 Rapid knowledge transfer among workers 4 2007
8,412,562 Retail high performance capability assessment 0 2008
8,078,485 Postal, freight, and logistics industry high performance capability assessment 15 2008
8,204,779 Revenue asset high performance capability assessment 4 2008
8,893,035 Method, system and graphical user interface for configuring a simulator to simulate a plurality of devices 0 2008
8,825,462 Method and system for simulating a plurality of devices 0 2008
8,781,882 Automotive industry high performance capability assessment 0 2008
8,214,238 Consumer goods and services high performance capability assessment 10 2009
8,095,405 Freight and logistics high performance capability assessment 0 2009
8,112,343 Capital markets high performance capability assessment 6 2009
8,239,246 Health and life sciences payer high performance capability assessment 1 2009
8,355,926 Health and life sciences medicaid high performance capability assessment 0 2010
8,880,422 Energy high performance capability assessment 0 2010
8,311,863 Utility high performance capability assessment 8 2010
8,442,857 Pulp and paper high performance capability assessment 0 2010
8,332,262 Chemical high performance capability assessment 0 2010
8,069,134 Rapid knowledge transfer among workers 2 2010
8,224,767 Rapid knowledge transfer among workers 0 2011
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (30)
7,574,740 Method and system for intrusion detection in a computer network 26 2000
7,162,649 Method and apparatus for network assessment and authentication 44 2000
* 6,907,531 Method and system for identifying, fixing, and updating security vulnerabilities 22 2000
7,178,166 Vulnerability assessment and authentication of a computer by a local scanner 162 2000
7,130,466 System and method for compiling images from a database and comparing the compiled images with known images 15 2000
7,921,459 System and method for managing security events on a network 9 2001
7,237,264 System and method for preventing network misuse 73 2001
7,146,305 Analytical virtual machine 41 2001
* 7,275,048 Product support of computer-related products using intelligent agents 14 2001
7,673,137 System and method for the managed security control of processes on a computer system 7 2003
7,913,303 Method and system for dynamically protecting a computer system from attack 19 2003
* 7,461,158 System and method for controlling access rights to network resources 39 2003
7,519,960 Method and system for debugging business process flow 18 2003
7,657,938 Method and system for protecting computer networks by altering unwanted network data traffic 5 2004
7,647,630 Associating security information with information objects in a data processing system 5 2005
7,512,792 Reference monitor method for enforcing information flow policies 6 2005
7,634,800 Method and apparatus for network assessment and authentication 50 2006
7,934,254 Method and apparatus for providing network and computer system security 6 2006
7,499,590 System and method for compiling images from a database and comparing the compiled images with known images 13 2006
7,657,419 Analytical virtual machine 15 2006
8,006,243 Method and apparatus for remote installation of network drivers and software 0 2006
* 8,006,303 System, method and program product for intrusion protection of a network 1 2007
* 7,712,138 Method and system for configuring and scheduling security audits of a computer network 11 2007
7,565,549 System and method for the managed security control of processes on a computer system 4 2007
7,607,124 Method for debugging a business process flow 18 2007
7,770,225 Method and apparatus for auditing network security 0 2008
8,024,565 Authorizing information flows 2 2008
7,975,295 Associating security information with information objects 1 2008
7,793,100 Reference monitor for enforcing information flow policies 4 2009
8,527,754 Authorizing information flows based on a sensitivity of an information object 0 2011
 
SECURE COMPUTING CORPORATION (29)
7,458,098 Systems and methods for enhancing electronic communication security 42 2002
7,124,438 Systems and methods for anomaly detection in patterns of monitored communications 51 2002
6,941,467 Systems and methods for adaptive message interrogation through multiple queues 63 2002
7,213,260 Systems and methods for upstream threat pushback 51 2003
7,694,128 Systems and methods for secure communication delivery 18 2003
8,132,250 Message profiling systems and methods 15 2005
7,089,590 Systems and methods for adaptive message interrogation through multiple queues 22 2005
7,225,466 Systems and methods for message threat management 29 2006
7,903,549 Content-based policy compliance systems and methods 16 2006
8,578,480 Systems and methods for identifying potentially malicious messages 2 2006
7,870,203 Methods and systems for exposing messaging reputation to an end user 23 2006
7,693,947 Systems and methods for graphically displaying messaging traffic 24 2006
7,779,466 Systems and methods for anomaly detection in patterns of monitored communications 14 2006
7,519,994 Systems and methods for adaptive message interrogation through multiple queues 20 2006
8,069,481 Systems and methods for message threat management 11 2006
* 8,042,181 Systems and methods for message threat management 14 2006
8,763,114 Detecting image spam 0 2007
8,561,167 Web reputation scoring 4 2007
8,214,497 Multi-dimensional reputation scoring 14 2007
8,179,798 Reputation based connection throttling 12 2007
7,949,716 Correlation and analysis of entity attributes 19 2007
7,937,480 Aggregation of reputation data 17 2007
7,779,156 Reputation based load balancing 19 2007
8,042,149 Systems and methods for message threat management 13 2007
8,185,930 Adjusting filter or classification control settings 17 2007
8,045,458 Prioritizing network traffic 14 2007
8,635,690 Reputation based message processing 3 2008
8,160,975 Granular support vector machine with random granularity 11 2008
8,589,503 Prioritizing network traffic 2 2009
 
AIRDEFENSE, INC. (20)
7,383,577 Method and system for encrypted network management and intrusion detection 27 2002
7,086,089 Systems and methods for network security 46 2002
7,058,796 Method and system for actively defending a wireless LAN against attacks 39 2002
7,042,852 System and method for wireless LAN dynamic channel change with honeypot trap 34 2002
7,277,404 System and method for sensing wireless LAN activity 38 2003
7,359,676 Systems and methods for adaptively scanning for wireless communications 33 2003
7,322,044 Systems and methods for automated network policy exception detection and correction 99 2003
7,532,895 Systems and methods for adaptive location tracking 13 2004
7,522,908 Systems and methods for wireless network site survey 26 2004
7,355,996 Systems and methods for adaptive monitoring with bandwidth constraints 12 2004
7,324,804 Systems and methods for dynamic sensor discovery and selection 19 2004
8,196,199 Personal wireless monitoring agent 44 2005
7,577,424 Systems and methods for wireless vulnerability analysis 3 2005
7,715,800 Systems and methods for wireless intrusion detection using spectral analysis 5 2006
7,526,808 Method and system for actively defending a wireless LAN against attacks 4 2006
7,971,251 Systems and methods for wireless security using distributed collaboration of wireless clients 3 2006
7,970,013 Systems and methods for wireless network content filtering 4 2006
8,281,392 Methods and systems for wired equivalent privacy and Wi-Fi protected access protection 0 2006
7,779,476 Active defense against wireless intruders 1 2006
8,060,939 Method and system for securing wireless local area networks 1 2008
 
MCAFEE, INC. (12)
* 7,308,702 Locally adaptable central security management in a heterogeneous network environment 59 2000
* 6,775,780 Detecting malicious software by analyzing patterns of system calls generated during emulation 81 2000
* 6,546,493 System, method and computer program product for risk assessment scanning based on detected anomalous events 144 2001
* 6,742,128 Threat assessment orchestrator system and method 108 2002
* 8,181,222 Locally adaptable central security management in a heterogeneous network environment 0 2007
8,578,051 Reputation based load balancing 2 2010
8,621,638 Systems and methods for classification of messaging entities 3 2011
8,549,611 Systems and methods for classification of messaging entities 2 2011
8,631,495 Systems and methods for message threat management 2 2011
8,606,910 Prioritizing network traffic 2 2011
8,621,559 Adjusting filter or classification control settings 3 2012
8,762,537 Multi-dimensional reputation scoring 0 2012
 
Sprint Communications Company L.P. (12)
8,538,767 Method for discovering functional and system requirements in an integrated development process 0 2003
7,930,201 EDP portal cross-process integrated view 13 2003
7,849,438 Enterprise software development process for outsourced developers 26 2004
7,801,759 Concept selection tool and process 2 2004
7,774,743 Quality index for quality assurance in software development 23 2005
7,742,939 Visibility index for quality assurance in software development 4 2005
8,108,232 System and method for project contract management 2 2005
8,484,065 Small enhancement process workflow manager 1 2005
8,005,706 Method for identifying risks for dependent projects based on an enhanced telecom operations map 5 2007
8,000,992 System and method for project management plan workbook 3 2007
8,589,203 Project pipeline risk management system and methods for updating project resource distributions based on risk exposure level changes 0 2009
* 8,335,706 Program management for indeterminate scope initiatives 1 2009
 
SAP AG (10)
7,133,878 External evaluation processes 0 2002
* 7,031,787 Change management 22 2002
8,180,732 Distributing data in master data management systems 0 2003
7,509,326 Central master data management 21 2003
7,236,973 Collaborative master data management system for identifying similar objects including identical and non-identical attributes 19 2003
8,499,036 Collaborative design process 0 2003
7,930,149 Versioning of elements in a configuration model 6 2003
7,272,776 Master data quality 1 2003
8,061,604 System and method of master data management using RFID technology 0 2003
8,117,157 External evaluation processes 0 2006
 
TELOS CORPORATION (5)
6,901,346 System, method and medium for certifying and accrediting requirements compliance 26 2001
6,993,448 System, method and medium for certifying and accrediting requirements compliance 16 2001
7,380,270 Enhanced system, method and medium for certifying and accrediting requirements compliance 11 2001
6,983,221 Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing robust risk assessment model 11 2002
6,980,927 Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment 27 2002
 
VIVINT, INC. (5)
7,627,665 System and method for providing configurable security monitoring utilizing an integrated information system 12 2001
6,748,343 Method and process for configuring a premises for monitoring 21 2001
8,392,552 System and method for providing configurable security monitoring utilizing an integrated information system 2 2002
RE43598 Method and process for configuring a premises for monitoring 3 2008
8,700,769 System and method for providing configurable security monitoring utilizing an integrated information system 0 2012
 
FMR LLC (3)
8,180,873 Detecting fraudulent activity 0 2006
8,145,560 Detecting fraudulent activity on a network 0 2006
7,856,494 Detecting and interdicting fraudulent activity on a network 6 2006
 
INFOASSURE, INC. (3)
7,739,501 Cryptographic key construct 3 2005
7,715,565 Information-centric security 9 2005
7,711,120 Cryptographic key management 4 2005
 
PANASONIC CORPORATION (3)
7,685,435 Program development method, program development supporting system, and program installation method 3 2003
* 7,539,312 Program update method and server 2 2007
8,190,912 Program development method, program development supporting system, and program installation method 0 2008
 
STRAGENT, LLC (3)
8,204,945 Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail 4 2008
8,272,060 Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses 1 2010
8,166,549 Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses 0 2010
 
The Boeing Company (3)
8,056,114 Implementing access control policies across dissimilar access control platforms 2 2005
7,921,452 Defining consistent access control policies 7 2005
8,271,418 Checking rule and policy representation 2009
 
VIG ACQUISITIONS LTD., L.L.C. (3)
7,480,715 System and method for performing a predictive threat assessment based on risk factors 5 2003
7,016,813 Method and process for configuring a premises for monitoring 9 2004
7,933,989 Predictive threat assessment 1 2009
 
ALLIED AFFILIATED FUNDING, L.P. (2)
* 7,127,743 Comprehensive security structure platform for network managers 74 2000
7,877,804 Comprehensive security structure platform for network managers 2 2006
 
Asgent, Inc. (2)
* 7,260,830 Method and apparatus for establishing a security policy, and method and apparatus for supporting establishment of security policy 14 2001
7,823,206 Method and apparatus for establishing a security policy, and method and apparatus of supporting establishment of security policy 2 2007
 
SYMANTEC CORPORATION (2)
* 8,713,687 Methods and systems for enabling community-tested security features for legacy applications 0 2008
* 8,805,995 Capturing data relating to a threat 0 2009
 
TREND MICRO INCORPORATED (2)
7,340,776 Method and system for configuring and scheduling security audits of a computer network 31 2002
* 7,802,301 Spyware scanning and cleaning methods and system 0 2005
 
A-T Solutions, Inc. (1)
8,812,343 System and method for risk detection reporting and infrastructure 0 2013
 
AMAZON TECHNOLOGIES, INC. (1)
* 8,639,983 Self-service testing 0 2010
 
APPLE INC. (1)
* 8,682,706 Techniques for temporarily holding project stages 0 2007
 
ARBOR NETWORKS, INC. (1)
* 7,970,886 Detecting and preventing undesirable network traffic from being sourced out of a network domain 2 2000
 
CAYMAS SYSTEMS, INC. (1)
7,861,087 Systems and methods for state signing of internet resources 0 2007
 
Cipher Trust, Inc. (1)
7,096,498 Systems and methods for message threat management 66 2003
 
CISCO TECHNOLOGY, INC. (1)
* 6,985,920 Method and system for determining intra-session event correlation across network address translation devices 26 2003
 
CITRIX GATEWAYS, INC. (1)
8,559,449 Systems and methods for providing a VPN solution 1 2011
 
CLEARWIRE IP HOLDINGS LLC (1)
8,453,234 Centralized security management system 0 2006
 
COMPUTER ASSOCIATES THINK, INC. (1)
* 7,788,723 Method and apparatus for identifying computer vulnerabilities using exploit probes and remote scanning 6 2005
 
COMPUWARE CORPORATION (1)
* 6,519,763 Time management and task completion and prediction software 145 1999
 
EMC CORPORATION (1)
* 7,203,925 Graphical compiler 4 2001
 
GARMIN AT, INC. (1)
* 6,542,810 Multisource target correlation 25 2001
 
GEORGE P. JOHNSON COMPANY (1)
* 7,010,530 Event management system 10 2001
 
GOOGLE INC. (1)
7,290,278 Identity based service system 20 2003
 
GREENLINE SYSTEMS, INC. (1)
* 8,484,066 System and method for risk detection reporting and infrastructure 0 2004
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (1)
* 7,647,631 Automated user interaction in application assessment 3 2004
 
HONEYWELL INTERNATIONAL INC. (1)
* 7,483,757 Control system migration 2 2005
 
JDS UNIPHASE CORPORATION (1)
* 6,701,342 Method and apparatus for processing quality of service measurement data to assess a degree of compliance of internet services with service level agreements 100 2000
 
MERCURY KINGDOM ASSETS LIMITED (1)
7,370,270 XML schema evolution 6 2002
 
MICROSOFT CORPORATION (1)
* 8,037,109 Generation of repeatable synthetic data 0 2003
 
MVERIFY CORPORATION (1)
* 7,339,891 Method and system for evaluating wireless applications 9 2003
 
NEC CORPORATION (1)
* 7,610,625 Program control system, program control method and information control program 1 2002
 
NOKIA CORPORATION (1)
* 7,228,331 User oriented penalty count random rejection of electronic messages 4 2004
 
OLIVISTAR LLC (1)
7,944,469 System and method for using self-learning rules to enable adaptive security monitoring 5 2006
 
ORACLE INTERNATIONAL CORPORATION (1)
* 2014/0032,530 PROJECT MANAGEMENT SYSTEM WITH GEOGRAPHIC DATA 0 2012
 
PALO ALTO NETWORKS, INC. (1)
7,370,360 Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine 58 2002
 
SAP SE (1)
8,438,238 Master data access 0 2003
 
SONY ELECTRONICS INC. (1)
* 6,973,653 Method for utilizing resource characterizations to optimize performance in an electronic device 7 2000
 
SYBASE, INC. (1)
7,844,829 Secured database system with built-in antivirus protection 10 2006
 
TERADATA US, INC. (1)
* 7,131,142 Intelligent agents used to provide agent community security 5 2000
 
WHITE CYBER KNIGHT LTD. (1)
8,392,999 Apparatus and methods for assessing and maintaining security of a computerized system under development 0 2010
 
XEROX CORPORATION (1)
* 7,395,254 Method for dynamic knowledge capturing in production printing workflow domain 0 2005
 
Other [Check patent profile for assignment information] (1)
8,914,522 Systems and methods for facilitating a peer to peer route via a gateway 0 2005
* Cited By Examiner