US Patent No: 6,324,647

Number of patents in Portfolio can not be more than 2000

System, method and article of manufacture for security management in a development architecture framework

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A system, method, and article of manufacture are provided for providing security management in a development architecture framework. Unauthorized attempts to access a network are detected and when an unauthorized attempt to access the network is detected, a user is notified. Access from the network is restricted to a separate wide area network. The identities of users of credit cards are verified during transactions carried out over the network. The content of electronic mail communicated over the network is also monitored so that the communication of the electronic mail over the network is prevent when the content thereof being deemed inappropriate. The electronic mail is also encrypted during the communication thereof over the network.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
ACCENTURE GLOBAL SERVICES LIMITEDDUBLIN 4, IE1240

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Bowman-Amuah, Michel K 6426 Peek Vista Cir., Colorado Springs, CO 80918 56 17502

Cited Art Landscape

Patent Info (Count) # Cites Year
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (1)
5,890,133 Method and apparatus for dynamic optimization of business processes managed by a computer system 160 1996
 
ROUND ROCK RESEARCH, LLC (1)
* 5,577,209 Apparatus and method for providing multi-level security for communication among computers and terminals on a network 285 1994
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (1)
5,301,320 Workflow management and control system 242 1991
 
S.F. IP PROPERTIES 33 LLC (1)
* 5,163,098 System for preventing fraudulent use of credit card 109 1990
 
CISCO TECHNOLOGY, INC. (1)
* 5,961,594 Remote node maintenance and management method and system in communication networks using multiprotocol agents 94 1997
 
U.S. PHILIPS CORPORATION (1)
5,953,707 Decision support system for the management of an agile supply chain 483 1997
 
QUARK MEDIA HOUSE B.V. (1)
5,907,704 Hierarchical encapsulation of instantiated objects in a multimedia authoring system including internet accessible objects 404 1996
 
Check Point Software Technologies, Inc. (1)
* 5,987,611 System and methodology for managing internet access on a per application basis for client computers connected to the internet 829 1997
 
TW SECURITY CORP. (1)
* 5,835,722 System to control content and prohibit certain interactive attempts by a person using a personal computer 414 1996
 
GOOGLE INC. (1)
5,721,908 Computer network for WWW server data access over internet 445 1995
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (1)
* 2003/0033,406 Apparatus for and a method of network load testing 39 2002
 
SOLID STATE MEASUREMENTS, INC. (1)
* 2005/0146,348 Method and apparatus for determining the dielectric constant of a low permittivity dielectric on a semiconductor wafer 1 2003
 
TREND MICRO INCORPORATED (2)
7,340,776 Method and system for configuring and scheduling security audits of a computer network 38 2002
* 7,802,301 Spyware scanning and cleaning methods and system 1 2005
 
NEW TECH MACHINERY, INC. (1)
* 2002/0120,841 Dynamic PKI architecture 2 2000
 
TRANSPACIFIC ELECTRONICS, LLC (1)
* 2006/0044,261 Pointing input device imitating inputting of hotkeys of a keyboard 0 2004
 
PANASONIC CORPORATION (4)
7,685,435 Program development method, program development supporting system, and program installation method 3 2003
* 2004/0153,657 Program development method, program development supporting system, and program installation method 12 2003
* 7,539,312 Program update method and server 2 2007
8,190,912 Program development method, program development supporting system, and program installation method 0 2008
 
Asgent, Inc. (4)
* 7,260,830 Method and apparatus for establishing a security policy, and method and apparatus for supporting establishment of security policy 16 2001
* 2001/0049,793 Method and apparatus for establishing a security policy, and method and apparatus for supporting establishment of security policy 48 2001
7,823,206 Method and apparatus for establishing a security policy, and method and apparatus of supporting establishment of security policy 2 2007
* 2007/0271,593 Method and apparatus for establishing a security policy, and method and apparatus for supporting establishment of security policy 1 2007
 
Sony Electronics Inc. (1)
* 6,973,653 Method for utilizing resource characterizations to optimize performance in an electronic device 7 2000
 
VIG AQUISITIONS LTD., L.L.C. (4)
7,480,715 System and method for performing a predictive threat assessment based on risk factors 8 2003
7,016,813 Method and process for configuring a premises for monitoring 9 2004
* 2005/0021,309 Method and process for configuring a premises for monitoring 32 2004
7,933,989 Predictive threat assessment 2 2009
 
ORACLE INTERNATIONAL CORPORATION (2)
* 9,020,930 Project management system with geographic data 0 2012
* 2014/0032,530 PROJECT MANAGEMENT SYSTEM WITH GEOGRAPHIC DATA 0 2012
 
APPLE INC. (1)
* 8,682,706 Techniques for temporarily holding project stages 0 2007
 
OLIVISTAR LLC (2)
7,944,469 System and method for using self-learning rules to enable adaptive security monitoring 6 2006
* 2006/0195,569 System and method for using self-learning rules to enable adaptive security monitoring 59 2006
 
Sprint Communications Company L.P. (13)
* 2007/0276,674 Defining and sizing feasible approaches to business needs within an integrated development process 25 2003
8,538,767 Method for discovering functional and system requirements in an integrated development process 0 2003
7,930,201 EDP portal cross-process integrated view 15 2003
7,849,438 Enterprise software development process for outsourced developers 30 2004
7,801,759 Concept selection tool and process 4 2004
7,774,743 Quality index for quality assurance in software development 32 2005
7,742,939 Visibility index for quality assurance in software development 6 2005
8,108,232 System and method for project contract management 2 2005
8,484,065 Small enhancement process workflow manager 1 2005
8,005,706 Method for identifying risks for dependent projects based on an enhanced telecom operations map 6 2007
8,000,992 System and method for project management plan workbook 3 2007
8,589,203 Project pipeline risk management system and methods for updating project resource distributions based on risk exposure level changes 2 2009
* 8,335,706 Program management for indeterminate scope initiatives 2 2009
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (37)
7,574,740 Method and system for intrusion detection in a computer network 54 2000
7,162,649 Method and apparatus for network assessment and authentication 59 2000
* 6,907,531 Method and system for identifying, fixing, and updating security vulnerabilities 33 2000
7,178,166 Vulnerability assessment and authentication of a computer by a local scanner 217 2000
7,130,466 System and method for compiling images from a database and comparing the compiled images with known images 21 2000
7,921,459 System and method for managing security events on a network 23 2001
7,237,264 System and method for preventing network misuse 104 2001
7,146,305 Analytical virtual machine 55 2001
* 7,275,048 Product support of computer-related products using intelligent agents 18 2001
7,673,137 System and method for the managed security control of processes on a computer system 9 2003
7,913,303 Method and system for dynamically protecting a computer system from attack 36 2003
* 7,461,158 System and method for controlling access rights to network resources 61 2003
7,519,960 Method and system for debugging business process flow 24 2003
7,657,938 Method and system for protecting computer networks by altering unwanted network data traffic 8 2004
7,647,630 Associating security information with information objects in a data processing system 7 2005
7,512,792 Reference monitor method for enforcing information flow policies 9 2005
* 2007/0143,604 Reference monitor system and method for enforcing information flow policies 12 2005
* 2007/0143,601 System and method for authorizing information flows 19 2005
7,634,800 Method and apparatus for network assessment and authentication 88 2006
7,934,254 Method and apparatus for providing network and computer system security 15 2006
7,499,590 System and method for compiling images from a database and comparing the compiled images with known images 16 2006
7,657,419 Analytical virtual machine 39 2006
8,006,243 Method and apparatus for remote installation of network drivers and software 6 2006
* 8,006,303 System, method and program product for intrusion protection of a network 1 2007
* 7,712,138 Method and system for configuring and scheduling security audits of a computer network 21 2007
7,565,549 System and method for the managed security control of processes on a computer system 11 2007
9,027,121 Method and system for creating a record for one or more computer security incidents 0 2007
7,607,124 Method for debugging a business process flow 23 2007
* 2007/0276,692 Method for Debugging a Business Process Flow 21 2007
7,770,225 Method and apparatus for auditing network security 12 2008
8,024,565 Authorizing information flows 5 2008
7,975,295 Associating security information with information objects 3 2008
* 2008/0229,412 Associating Security Information with Information Objects 3 2008
* 2008/0229,413 Authorizing Information Flows 5 2008
7,793,100 Reference monitor for enforcing information flow policies 7 2009
8,527,754 Authorizing information flows based on a sensitivity of an information object 0 2011
* 2013/0212,685 NETWORk THREAT RISK ASSESSMENT TOOL 0 2013
 
SAP SE (16)
* 2003/0130,749 Multi-purpose configuration model 3 2002
7,133,878 External evaluation processes 0 2002
* 7,031,787 Change management 27 2002
* 2003/0182,145 Change management 3 2002
8,180,732 Distributing data in master data management systems 2 2003
7,509,326 Central master data management 27 2003
7,236,973 Collaborative master data management system for identifying similar objects including identical and non-identical attributes 25 2003
* 2004/0103,182 Distribution in master data management 19 2003
8,499,036 Collaborative design process 0 2003
8,438,238 Master data access 5 2003
* 2004/0117,377 Master data access 32 2003
7,930,149 Versioning of elements in a configuration model 8 2003
7,272,776 Master data quality 1 2003
8,061,604 System and method of master data management using RFID technology 1 2003
8,117,157 External evaluation processes 0 2006
9,256,655 Dynamic access of data 0 2013
 
VIVINT, INC. (6)
7,627,665 System and method for providing configurable security monitoring utilizing an integrated information system 24 2001
6,748,343 Method and process for configuring a premises for monitoring 22 2001
8,392,552 System and method for providing configurable security monitoring utilizing an integrated information system 4 2002
RE43598 Method and process for configuring a premises for monitoring 5 2008
RE45649 Method and process for configuring a premises for monitoring 0 2012
8,700,769 System and method for providing configurable security monitoring utilizing an integrated information system 1 2012
 
CISCO TECHNOLOGY, INC. (2)
* 6,985,920 Method and system for determining intra-session event correlation across network address translation devices 28 2003
* 2004/0260,763 Method and system for determining intra-session event correlation across network address translation devices 2 2003
 
Airdefense, Inc. (27)
7,383,577 Method and system for encrypted network management and intrusion detection 31 2002
7,086,089 Systems and methods for network security 55 2002
7,058,796 Method and system for actively defending a wireless LAN against attacks 44 2002
7,042,852 System and method for wireless LAN dynamic channel change with honeypot trap 45 2002
* 2004/0203,764 Methods and systems for identifying nodes and mapping their locations 23 2002
* 2003/0236,990 Systems and methods for network security 34 2002
* 2003/0233,567 Method and system for actively defending a wireless LAN against attacks 36 2002
* 2003/0219,008 System and method for wireless lan dynamic channel change with honeypot trap 53 2002
* 2003/0217,283 Method and system for encrypted network management and intrusion detection 54 2002
7,277,404 System and method for sensing wireless LAN activity 45 2003
* 2004/0008,652 System and method for sensing wireless LAN activity 81 2003
7,359,676 Systems and methods for adaptively scanning for wireless communications 40 2003
7,322,044 Systems and methods for automated network policy exception detection and correction 143 2003
7,532,895 Systems and methods for adaptive location tracking 17 2004
7,522,908 Systems and methods for wireless network site survey 30 2004
7,355,996 Systems and methods for adaptive monitoring with bandwidth constraints 14 2004
7,324,804 Systems and methods for dynamic sensor discovery and selection 21 2004
* 2005/0174,961 Systems and methods for adaptive monitoring with bandwidth constraints 21 2004
8,196,199 Personal wireless monitoring agent 90 2005
7,577,424 Systems and methods for wireless vulnerability analysis 5 2005
7,715,800 Systems and methods for wireless intrusion detection using spectral analysis 16 2006
7,526,808 Method and system for actively defending a wireless LAN against attacks 6 2006
7,971,251 Systems and methods for wireless security using distributed collaboration of wireless clients 4 2006
7,970,013 Systems and methods for wireless network content filtering 7 2006
8,281,392 Methods and systems for wired equivalent privacy and Wi-Fi protected access protection 1 2006
7,779,476 Active defense against wireless intruders 1 2006
8,060,939 Method and system for securing wireless local area networks 2 2008
 
SECURE COMPUTING CORPORATION (29)
7,458,098 Systems and methods for enhancing electronic communication security 87 2002
7,124,438 Systems and methods for anomaly detection in patterns of monitored communications 62 2002
6,941,467 Systems and methods for adaptive message interrogation through multiple queues 68 2002
7,213,260 Systems and methods for upstream threat pushback 102 2003
7,694,128 Systems and methods for secure communication delivery 34 2003
8,132,250 Message profiling systems and methods 33 2005
7,089,590 Systems and methods for adaptive message interrogation through multiple queues 30 2005
7,225,466 Systems and methods for message threat management 47 2006
7,903,549 Content-based policy compliance systems and methods 29 2006
8,578,480 Systems and methods for identifying potentially malicious messages 14 2006
7,870,203 Methods and systems for exposing messaging reputation to an end user 49 2006
7,693,947 Systems and methods for graphically displaying messaging traffic 40 2006
7,779,466 Systems and methods for anomaly detection in patterns of monitored communications 27 2006
7,519,994 Systems and methods for adaptive message interrogation through multiple queues 30 2006
8,069,481 Systems and methods for message threat management 31 2006
* 8,042,181 Systems and methods for message threat management 31 2006
8,763,114 Detecting image spam 1 2007
8,561,167 Web reputation scoring 18 2007
8,214,497 Multi-dimensional reputation scoring 26 2007
8,179,798 Reputation based connection throttling 14 2007
7,949,716 Correlation and analysis of entity attributes 24 2007
7,937,480 Aggregation of reputation data 26 2007
7,779,156 Reputation based load balancing 22 2007
8,042,149 Systems and methods for message threat management 27 2007
8,185,930 Adjusting filter or classification control settings 30 2007
8,045,458 Prioritizing network traffic 50 2007
8,635,690 Reputation based message processing 7 2008
8,160,975 Granular support vector machine with random granularity 16 2008
8,589,503 Prioritizing network traffic 6 2009
 
Teradata US, Inc. (1)
* 7,131,142 Intelligent agents used to provide agent community security 7 2000
 
CITRIX GATEWAYS, INC (1)
8,559,449 Systems and methods for providing a VPN solution 3 2011
 
InfoAssure, Inc. (4)
7,739,501 Cryptographic key construct 5 2005
7,715,565 Information-centric security 10 2005
7,711,120 Cryptographic key management 4 2005
* 2006/0242,407 Cryptographic key management 26 2005
 
PALO ALTO NETWORKS, INC. (1)
7,370,360 Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine 80 2002
 
ACCENTURE GLOBAL SERVICES LIMITED (33)
* 6,615,166 Prioritizing components of a network framework required for implementation of technology 446 1999
7,139,999 Development architecture framework 241 1999
6,662,357 Managing information in an integrated development architecture framework 319 1999
7,415,509 Operations architectures for netcentric computing systems 21 2000
7,403,946 Data management for netcentric computing systems 31 2000
7,068,680 Communication service architectures for netcentric computing systems 40 2000
6,988,249 Presentation service architectures for netcentric computing systems 15 2000
6,874,010 Base service architectures for netcentric computing systems 96 2000
7,020,697 Architectures for netcentric computing systems 284 2000
* 7,321,886 Rapid knowledge transfer among workers 27 2003
* 2005/0027,696 Rapid knowledge transfer among workers 45 2003
7,734,687 Environment service architectures for netcentric computing systems 1 2005
7,467,198 Architectures for netcentric computing systems 114 2005
7,809,671 Rapid knowledge transfer among workers 5 2007
* 2008/0215,683 Rapid knowledge transfer among workers 4 2007
8,412,562 Retail high performance capability assessment 0 2008
8,078,485 Postal, freight, and logistics industry high performance capability assessment 24 2008
8,204,779 Revenue asset high performance capability assessment 8 2008
8,893,035 Method, system and graphical user interface for configuring a simulator to simulate a plurality of devices 0 2008
8,825,462 Method and system for simulating a plurality of devices 0 2008
* 2010/0070,909 METHOD AND SYSTEM FOR SIMULATING A PLURALITY OF DEVICES 2 2008
8,781,882 Automotive industry high performance capability assessment 6 2008
8,214,238 Consumer goods and services high performance capability assessment 17 2009
8,095,405 Freight and logistics high performance capability assessment 0 2009
8,112,343 Capital markets high performance capability assessment 6 2009
8,239,246 Health and life sciences payer high performance capability assessment 1 2009
8,355,926 Health and life sciences medicaid high performance capability assessment 1 2010
8,880,422 Energy high performance capability assessment 0 2010
8,311,863 Utility high performance capability assessment 13 2010
8,442,857 Pulp and paper high performance capability assessment 0 2010
8,332,262 Chemical high performance capability assessment 0 2010
8,069,134 Rapid knowledge transfer among workers 4 2010
8,224,767 Rapid knowledge transfer among workers 3 2011
 
ALLIED AFFILIATED FUNDING, L.P. (3)
* 7,127,743 Comprehensive security structure platform for network managers 82 2000
7,877,804 Comprehensive security structure platform for network managers 3 2006
* 2007/0234,426 COMPREHENSIVE SECURITY STRUCTURE PLATFORM FOR NETWORK MANAGERS 45 2006
 
mVerify Corporation (2)
* 7,339,891 Method and system for evaluating wireless applications 12 2003
* 2003/0156,549 Method and system for evaluating wireless applications 11 2003
 
Cipher Trust, Inc. (1)
7,096,498 Systems and methods for message threat management 103 2003
 
SAP AG (6)
* 2003/0182,167 Goal management 5 2002
* 2004/0044,730 Dynamic access of data 14 2003
* 2005/0091,179 Collaborative design process 14 2003
* 2005/0149,474 Master data entry 1 2003
* 2005/0144,552 Master data quality 6 2003
* 2007/0038,686 External evaluation processes 1 2006
 
EMC CORPORATION (1)
* 7,203,925 Graphical compiler 7 2001
 
RED HAT, INC. (1)
* 2012/0090,025 SYSTEMS AND METHODS FOR DETECTION OF MALICIOUS SOFTWARE PACKAGES 3 2010
 
Clearwire IP Holdings LLC (2)
8,453,234 Centralized security management system 2 2006
* 2008/0127,337 CENTRALIZED SECURITY MANAGEMENT SYSTEM 4 2006
 
SYMANTEC CORPORATION (4)
* 8,713,687 Methods and systems for enabling community-tested security features for legacy applications 0 2008
* 2010/0154,027 Methods and Systems for Enabling Community-Tested Security Features for Legacy Applications 1 2008
* 8,805,995 Capturing data relating to a threat 1 2009
9,332,033 Methods and systems for enabling community-tested security features for legacy applications 0 2014
 
ANGEL SECURE NETWORKS, INC. (3)
9,058,482 Controlling user access to electronic resources without password 0 2012
8,930,717 Secure processing module and method for making the same 0 2012
9,270,660 System and method for using a separate device to facilitate authentication 0 2013
 
FMR LLC (8)
8,180,873 Detecting fraudulent activity 2 2006
8,145,560 Detecting fraudulent activity on a network 2 2006
7,856,494 Detecting and interdicting fraudulent activity on a network 13 2006
* 2008/0114,883 Unifying User Sessions on a Network 3 2006
* 2008/0114,886 Detecting and Interdicting Fraudulent Activity on a Network 9 2006
* 2008/0114,885 Detecting Fraudulent Activity on a Network 3 2006
* 2008/0114,888 Subscribing to Data Feeds on a Network 3 2006
* 2008/0115,213 Detecting Fraudulent Activity on a Network Using Stored Information 19 2006
 
SYBASE, INC. (2)
7,844,829 Secured database system with built-in antivirus protection 31 2006
* 2007/0168,678 Secured Database System with Built-in Antivirus Protection 8 2006
 
COMPUWARE CORPORATION (1)
* 6,519,763 Time management and task completion and prediction software 160 1999
 
White Cyber Knight Ltd. (3)
* 2007/0143,849 Method and a software system for end-to-end security assessment for security and CIP professionals 4 2005
8,392,999 Apparatus and methods for assessing and maintaining security of a computerized system under development 0 2010
* 2010/0306,852 Apparatus and Methods for Assessing and Maintaining Security of a Computerized System under Development 3 2010
 
Raytheon Foreground Security, Inc. (1)
9,258,321 Automated internet threat detection and mitigation system and associated methods 0 2013
 
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP (2)
* 7,647,631 Automated user interaction in application assessment 5 2004
* 2005/0132,232 Automated user interaction in application assessment 7 2004
 
XEROX CORPORATION (2)
* 7,395,254 Method for dynamic knowledge capturing in production printing workflow domain 0 2005
* 2006/0242,097 Method for dynamic knowledge capturing in production printing workflow domain 4 2005
 
AMAZON TECHNOLOGIES, INC. (2)
* 8,639,983 Self-service testing 0 2010
9,053,084 Self-service testing 0 2013
 
Arbor Networks, Inc. (1)
* 7,970,886 Detecting and preventing undesirable network traffic from being sourced out of a network domain 3 2000
 
NOKIA TECHNOLOGIES OY (2)
* 7,228,331 User oriented penalty count random rejection of electronic messages 5 2004
* 2006/0031,507 User oriented penalty count random rejection 0 2004
 
Telos Corporation (9)
6,901,346 System, method and medium for certifying and accrediting requirements compliance 40 2001
6,993,448 System, method and medium for certifying and accrediting requirements compliance 18 2001
7,380,270 Enhanced system, method and medium for certifying and accrediting requirements compliance 28 2001
* 2003/0050,718 Enhanced system, method and medium for certifying and accrediting requirements compliance 19 2001
6,983,221 Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing robust risk assessment model 14 2002
6,980,927 Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment 33 2002
* 2004/0103,309 Enhanced system, method and medium for certifying and accrediting requirements complianceutilizing threat vulnerability feed 25 2002
* 2004/0102,923 Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment 14 2002
* 2004/0102,922 Enhanced system, method and medium for certifying and accrediting requirements complianceutilizing robust risk assessment model 11 2002
 
NEC CORPORATION (1)
* 7,610,625 Program control system, program control method and information control program 1 2002
 
ANGEL SECURE NETWORKS (1)
* 2012/0260,105 SYSTEM AND METHOD FOR DEFENDING AGAINST REVERSE ENGINEERING OF SOFTWARE, FIRMWARE AND HARDWARE 1 2010
 
SEARETE LLC (1)
* 2006/0288,225 User-centric question and answer for authentication and security 7 2005
 
VIAVI SOLUTIONS INC. (1)
* 6,701,342 Method and apparatus for processing quality of service measurement data to assess a degree of compliance of internet services with service level agreements 113 2000
 
STRAGENT, LLC (3)
8,204,945 Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail 6 2008
8,272,060 Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses 2 2010
8,166,549 Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses 0 2010
 
MICROSOFT TECHNOLOGY LICENSING, LLC (2)
* 8,037,109 Generation of repeatable synthetic data 0 2003
* 2004/0267,773 Generation of repeatable synthetic data 1 2003
 
Garmin AT, Inc. (1)
* 6,542,810 Multisource target correlation 28 2001
 
GOOGLE INC. (1)
7,290,278 Identity based service system 28 2003
 
ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE (1)
* 2006/0129,810 Method and apparatus for evaluating security of subscriber network 21 2005
 
UBS Financial Services, Inc. (1)
* 2003/0191,703 Method and system for providing interested party access to aggregated accounts information 59 2002
 
MERCURY KINGDOM ASSETS LIMITED (1)
7,370,270 XML schema evolution 6 2002
 
A-T SOLUTIONS, INC. (4)
* 8,484,066 System and method for risk detection reporting and infrastructure 4 2004
* 2005/0021,360 System and method for risk detection reporting and infrastructure 40 2004
8,812,343 System and method for risk detection reporting and infrastructure 0 2013
9,177,279 System and method for risk detection reporting and infrastructure 0 2014
 
COMPUTER ASSOCIATES THINK, INC. (2)
* 7,788,723 Method and apparatus for identifying computer vulnerabilities using exploit probes and remote scanning 16 2005
* 2006/0265,750 Method and apparatus for providing computer security 39 2005
 
HONEYWELL INTERNATIONAL INC. (2)
* 7,483,757 Control system migration 3 2005
* 2007/0021,852 Control system migration 2 2005
 
GEORGE P. JOHNSON COMPANY (1)
* 7,010,530 Event management system 10 2001
 
GATEWAY, INC. (1)
* 2008/0012,935 Inappropriate content detection and distribution prevention for wireless cameras/camcorders with e-mail capabilities and camera phones 7 2005
 
CAYMAS SYSTEMS, INC. (1)
7,861,087 Systems and methods for state signing of internet resources 0 2007
 
THE BOEING COMPANY (7)
8,056,114 Implementing access control policies across dissimilar access control platforms 2 2005
7,921,452 Defining consistent access control policies 26 2005
* 2007/0056,019 Implementing access control policies across dissimilar access control platforms 40 2005
* 2007/0056,018 Defining consistent access control policies 17 2005
* 2008/0294,505 METHODS AND SYSTEMS FOR TASK ASSESSMENT MANAGEMENT 3 2007
* 2009/0119,746 GLOBAL POLICY APPARATUS AND RELATED METHODS 3 2008
8,271,418 Checking rule and policy representation 3 2009
 
CATERPILLAR INC. (1)
* 9,256,227 System and method for controlling the operation of a machine 0 2014
 
CITRIX SYSTEMS, INC. (52)
7,617,531 Inferencing data types of message components 18 2004
7,827,139 Methods and apparatus for sharing graphical screen data in a bandwidth-adaptive manner 8 2004
7,680,885 Methods and apparatus for synchronization of data set representations in a bandwidth-adaptive manner 5 2004
8,145,777 Method and system for real-time seeking during playback of remote presentation protocols 3 2005
8,443,040 Method and system for synchronizing presentation of a dynamic data set to a plurality of nodes 3 2005
8,739,274 Method and device for performing integrated caching in a data communication network 0 2005
9,219,579 Systems and methods for client-side application-aware prioritization of network communications 0 2005
8,914,522 Systems and methods for facilitating a peer to peer route via a gateway 0 2005
8,363,650 Method and systems for routing packets from a gateway to an endpoint 7 2005
8,291,119 Method and systems for securing remote access to private networks 7 2005
8,191,008 Simulating multi-monitor functionality in a single monitor environment 2 2005
7,924,884 Performance logging using relative differentials and skip recording 6 2005
8,954,595 Systems and methods for providing client-side accelerated access to remote applications via TCP buffering 1 2005
8,706,877 Systems and methods for providing client-side dynamic redirection to bypass an intermediary 1 2005
8,700,695 Systems and methods for providing client-side accelerated access to remote applications via TCP pooling 0 2005
8,549,149 Systems and methods for providing client-side accelerated access to remote applications via TCP multiplexing 3 2005
8,495,305 Method and device for performing caching of dynamically generated objects in a data communication network 6 2005
8,301,839 System and method for performing granular invalidation of cached dynamically generated objects in a data communication network 1 2005
8,255,456 System and method for performing flash caching of dynamically generated objects in a data communication network 7 2005
7,810,089 Systems and methods for automatic installation and execution of a client-side acceleration program 25 2005
8,677,252 Systems and methods for displaying to a presenter visual feedback corresponding to visual changes received by viewers 0 2006
7,747,953 Methods and systems for receiving feedback from a scalable number of participants of an on-line presentation 2 2006
7,831,728 Methods and systems for real-time seeking during real-time playback of a presentation layer protocol data stream 2 2006
8,701,010 Systems and methods of using the refresh button to determine freshness policy 0 2007
8,504,775 Systems and methods of prefreshening cached objects based on user's current web page 37 2007
8,103,783 Systems and methods of providing security and reliability to proxy caches 19 2007
8,037,126 Systems and methods of dynamically checking freshness of cached objects based on link status 2 2007
8,886,822 Systems and methods for accelerating delivery of a computing environment to a remote user 1 2007
8,275,829 Systems and methods of prefetching objects for caching using QoS 7 2009
8,011,009 Inferencing data types of message components 0 2009
8,589,579 Systems and methods for real-time endpoint application flow control with network structure component 1 2009
8,935,316 Methods and systems for in-session playback on a local machine of remotely-stored and real time presentation layer protocol data 0 2009
8,296,441 Methods and systems for joining a real-time session of presentation layer protocol data 1 2009
8,200,828 Systems and methods for single stack shadowing 0 2009
8,364,785 Systems and methods for domain name resolution interception caching 47 2009
8,422,851 System and methods for automatic time-warped playback in rendering a recorded computer session 0 2010
8,375,087 Methods and apparatus for synchronization of data set representations in a bandwidth-adaptive manner 1 2010
8,725,791 Methods and systems for providing a consistent profile to overlapping user sessions 0 2010
8,634,420 Systems and methods for communicating a lossy protocol via a lossless protocol 3 2010
8,261,057 System and method for establishing a virtual private network 12 2010
9,071,526 Systems and methods for platform rate limiting 0 2010
8,615,583 Systems and methods of revalidating cached objects in parallel with request for object 7 2010
8,351,333 Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements 18 2010
8,856,777 Systems and methods for automatic installation and execution of a client-side acceleration program 0 2010
8,499,057 System and method for performing flash crowd caching of dynamically generated objects in a data communication network 6 2011
8,695,084 Inferencing data types of message components 0 2011
8,615,159 Methods and systems for cataloging text in a recorded session 1 2011
8,848,710 System and method for performing flash caching of dynamically generated objects in a data communication network 0 2012
8,726,006 System and method for establishing a virtual private network 0 2012
8,892,778 Method and systems for securing remote access to private networks 0 2012
8,897,299 Method and systems for routing packets from a gateway to an endpoint 0 2013
8,788,581 Method and device for performing caching of dynamically generated objects in a data communication network 0 2013
 
MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. (2)
* 2007/0217,614 Program update method and server 7 2007
* 2009/0037,721 PROGRAM DEVELOPMENT METHOD, PROGRAM DEVELOPMENT SUPPORTING SYSTEM, AND PROGRAM INSTALLATION METHOD 3 2008
 
MCAFEE, INC. (13)
* 7,308,702 Locally adaptable central security management in a heterogeneous network environment 77 2000
* 6,775,780 Detecting malicious software by analyzing patterns of system calls generated during emulation 105 2000
* 6,546,493 System, method and computer program product for risk assessment scanning based on detected anomalous events 166 2001
* 6,742,128 Threat assessment orchestrator system and method 139 2002
* 8,181,222 Locally adaptable central security management in a heterogeneous network environment 10 2007
8,578,051 Reputation based load balancing 4 2010
8,621,638 Systems and methods for classification of messaging entities 7 2011
8,549,611 Systems and methods for classification of messaging entities 15 2011
8,631,495 Systems and methods for message threat management 13 2011
8,606,910 Prioritizing network traffic 4 2011
8,621,559 Adjusting filter or classification control settings 5 2012
9,009,321 Multi-dimensional reputation scoring 0 2012
8,762,537 Multi-dimensional reputation scoring 2 2012
* Cited By Examiner