US Patent No: 7,308,702

Number of patents in Portfolio can not be more than 2000

Locally adaptable central security management in a heterogeneous network environment

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A system and method for defining and enforcing a security policy. Security mechanism application specific information for each security mechanism is encapsulated as a key and exported to a semantic layer. Keys are combined to form key chains within the semantic layer. The key chains are in turn encapsulated as keys and passed to another semantic layer. A security policy is defined by forming key chains from keys and associating users with the key chains. The security policy is translated and exported to the security mechanisms. The security policy is then enforced via the security mechanisms.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
MCAFEE, INC.SANTA CLARA, CA1092

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Bogle, Jessica Roseville, MN 2 107
O'Brien, Richard Brooklyn Park, MN 32 366
Payne, Charles Oakdale, MN 3 107
Thomsen, Daniel Jay Minneapolis, MN 3 107

Cited Art Landscape

Patent Info (Count) # Cites Year
 
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP (2)
* 6,035,399 Checkpoint object 31 1995
5,826,239 Distributed workflow resource management system and method 317 1996
 
The United States of America as represented by the Secretary of Commerce (1)
* 6,088,679 Workflow management employing role-based access control 253 1997
 
IPG HEALTHCARE 501 LIMITED (1)
* 5,335,346 Access control policies for an object oriented database, including access control lists which span across object boundaries 298 1991
 
PTC INC. (1)
* 5,745,687 System for distributed workflow in which a routing node selects next node to be performed within a workflow procedure 102 1997
 
ACCENTURE GLOBAL SERVICES LIMITED (1)
* 6,324,647 System, method and article of manufacture for security management in a development architecture framework 281 1999
 
MCAFEE, INC. (1)
* 6,357,010 System and method for controlling access to documents stored on an internal network 209 1998
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (14)
* 8,423,394 Method for tracking the status of a workflow using weblogs 0 2003
* 2005/0131,750 Method for tracking the status of a workflow using weblogs 16 2003
8,140,691 Role-based views access to a workflow weblog 0 2004
8,417,682 Visualization of attributes of workflow weblogs 1 2005
* 8,887,241 Virtual roles 0 2006
* 2007/0198,522 Virtual roles 3 2006
* 2008/0005,115 Methods and apparatus for scoped role-based access control 10 2006
* 2009/0012,987 METHOD AND SYSTEM FOR DELIVERING ROLE-APPROPRIATE POLICIES 6 2007
* 8,458,337 Methods and apparatus for scoped role-based access control 10 2008
* 2008/0243,856 Methods and Apparatus for Scoped Role-Based Access Control 3 2008
8,640,195 Method and system for automating security policy definition based on recorded transactions 1 2009
* 2011/0078,759 Method and System For Automating Security Policy Definition Based On Recorded Transactions 1 2009
* 8,649,399 Check operation dispersed storage network frame 1 2011
* 2011/0264,950 CHECK OPERATION DISPERSED STORAGE NETWORK FRAME 9 2011
 
ULTIMUS, INC. (1)
* 7,765,291 Business process management/workflow automation software 4 2004
 
SAP SE (2)
* 7,885,847 End user oriented workflow approach including structured processing of ad hoc workflows with a collaborative process engine 9 2004
* 2005/0027,585 End user oriented workflow approach including structured processing of ad hoc workflows with a collaborative process engine 38 2004
 
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP (2)
* 2012/0246,695 ACCESS CONTROL OF DISTRIBUTED COMPUTING RESOURCES SYSTEM AND METHOD 4 2009
9,479,539 Distributed network instrumentation system 0 2015
 
BUSINESS OBJECTS SOFTWARE LTD. (1)
* 2011/0055,890 METHOD AND SYSTEM TO CONFIGURE SECURITY RIGHTS BASED ON CONTEXTUAL INFORMATION 2 2009
 
ADVENTIUM ENTERPRISES, LLC (2)
9,485,218 Device for preventing, detecting and responding to security threats 0 2010
* 2011/0238,979 Device for Preventing, Detecting and Responding to Security Threats 1 2010
 
AMAZON TECHNOLOGIES, INC. (1)
* 9,083,749 Managing multiple security policy representations in a distributed environment 1 2012
 
HONEYWELL INTERNATIONAL INC. (1)
8,572,404 Security and safety manager implementation in a multi-core processor 0 2011
 
FLASH NETWORKS LTD. (2)
* 8,972,518 Integrated data-model and flow based policy system 0 2007
* 2009/0083,408 INTEGRATED DATA-MODEL AND FLOW BASED POLICY SYSTEM 7 2007
 
SecurityProfiling, LLC (9)
9,117,069 Real-time vulnerability monitoring 0 2013
9,350,752 Anti-vulnerability system, method, and computer program product 0 2014
9,118,708 Multi-path remediation 0 2014
9,118,709 Anti-vulnerability system, method, and computer program product 0 2014
9,100,431 Computer program product and apparatus for multi-path remediation 0 2014
8,984,644 Anti-vulnerability system, method, and computer program product 0 2014
9,118,710 System, method, and computer program product for reporting an occurrence in different manners 0 2014
9,118,711 Anti-vulnerability system, method, and computer program product 0 2014
9,225,686 Anti-vulnerability system, method, and computer program product 0 2015
 
INTELLECTUAL VENTURES I LLC (19)
7,950,066 Method and system for restricting use of a clipboard application 71 2001
7,631,184 System and method for imposing security on copies of secured items 30 2002
7,565,683 Method and system for implementing changes to security policies in a distributed security system 35 2002
7,729,995 Managing secured files in designated locations 30 2002
8,006,280 Security system for generating keys from access rules in a decentralized manner and methods therefor 17 2002
8,176,334 Document security system that permits external users to gain access to secured files 12 2002
7,921,450 Security system using indirect key generation from access rules and methods therefor 27 2002
7,890,990 Security system with staging capabilities 9 2002
8,707,034 Method and system for using remote headers to secure electronic files 3 2003
* 7,703,140 Method and system for securing digital assets using process-driven security policies 35 2003
8,613,102 Method and system for providing document retention using cryptography 28 2004
8,543,827 Methods and systems for providing access control to secured data 2 2008
8,327,138 Method and system for securing digital assets using process-driven security policies 3 2010
8,341,407 Method and system for protecting electronic data in enterprise environment 1 2011
8,341,406 System and method for providing different levels of key security for controlling access to secured items 0 2011
8,918,839 System and method for providing multi-location access management to secured items 2 2011
8,739,302 Method and apparatus for transitioning between states of security policies used to secure electronic documents 1 2012
8,943,316 Document security system that permits external users to gain access to secured files 0 2012
9,129,120 Methods and systems for providing access control to secured data 2 2014
 
United States Postal Service (3)
* 8,601,049 System and method for providing centralized management and distribution of information to remote users 1 2004
* 2005/0197,871 System and method for providing centralized management and distribution of information to remote users 18 2004
9,293,030 System and method for providing centralized management and distribution of information to remote users 0 2013
 
ORACLE INTERNATIONAL CORPORATION (10)
8,015,600 Employing electronic certificate workflows 4 2001
7,937,655 Workflows with associated processes 13 2001
7,802,174 Domain based workflows 17 2001
7,711,818 Support for multiple data stores 11 2001
* 7,581,011 Template based workflow definition 43 2001
7,840,658 Employing job code attributes in provisioning 8 2002
7,673,047 Determining a user's groups 11 2006
* 2011/0093,469 TECHNIQUES FOR EXTRACTING SEMANTIC DATA STORES 5 2009
9,235,649 Domain based workflows 0 2010
8,756,191 Massively scalable reasoning architecture 0 2013
 
INTELLECTUAL VENTURES I LLC (21)
8,065,713 System and method for providing multi-location access management to secured items 32 2002
7,681,034 Method and apparatus for securing electronic data 36 2002
7,921,288 System and method for providing different levels of key security for controlling access to secured items 49 2002
7,478,418 Guaranteed delivery of changes to security policies in a distributed system 44 2002
7,562,232 System and method for providing manageability to security information for secured items 30 2002
7,512,810 Method and system for protecting encrypted files transmitted over a network 38 2002
7,836,310 Security system that uses indirect password-based encryption 10 2002
7,577,838 Hybrid systems for securing digital assets 13 2002
7,930,756 Multi-level cryptographic transformations for securing digital assets 17 2003
7,730,543 Method and system for enabling users of a group shared across multiple file security systems to access secured files 34 2003
7,555,558 Method and system for fault-tolerant transfer of files across a network 24 2003
8,127,366 Method and apparatus for transitioning between states of security policies used to secure electronic documents 11 2003
7,748,045 Method and system for providing cryptographic document retention with off-line access 26 2004
7,707,427 Multi-level file digests 24 2004
RE41546 Method and system for managing security tiers 14 2007
7,913,311 Methods and systems for providing access control to electronic data 25 2007
RE43906 Method and apparatus for securing digital assets 4 2008
8,307,067 Protecting encrypted files transmitted over a network 103 2009
8,266,674 Method and system for implementing changes to security policies in a distributed security system 0 2009
8,301,896 Multi-level file digests 0 2010
9,286,484 Method and system for providing document retention using cryptography 0 2013
 
MICROSOFT TECHNOLOGY LICENSING, LLC (3)
* 8,478,715 Extending OLAP navigation employing analytic workflows 2 2008
* 2009/0287,675 Extending OLAP Navigation Employing Analytic Workflows 2 2008
9,244,998 Extending olap navigation employing analytic workflows 0 2013
 
SOFTWARE AG (2)
8,484,714 Method and rule-repository for generating security-definitions for heterogeneous systems 0 2008
* 2010/0083,348 Method and rule-repository for generating security-definitions for heterogeneous systems 0 2008
 
PERVASIVE SECURITY SYSTEM, INC. (1)
7,921,284 Method and system for protecting electronic data in enterprise environment 21 2002
 
MCAFEE, INC. (2)
8,181,222 Locally adaptable central security management in a heterogeneous network environment 10 2007
* 2008/0066,151 Locally adaptable central security management in a heterogeneous network environment 18 2007
* Cited By Examiner

Maintenance Fees

Fee Large entity fee small entity fee micro entity fee due date
11.5 Year Payment $7400.00 $3700.00 $1850.00 Jun 11, 2019
Fee Large entity fee small entity fee micro entity fee
Surcharge - 11.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge after expiration - Late payment is unavoidable $700.00 $350.00 $175.00
Surcharge after expiration - Late payment is unintentional $1,640.00 $820.00 $410.00