US Patent No: 7,308,702

Number of patents in Portfolio can not be more than 2000

Locally adaptable central security management in a heterogeneous network environment

Stats

See full text
ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A system and method for defining and enforcing a security policy. Security mechanism application specific information for each security mechanism is encapsulated as a key and exported to a semantic layer. Keys are combined to form key chains within the semantic layer. The key chains are in turn encapsulated as keys and passed to another semantic layer. A security policy is defined by forming key chains from keys and associating users with the key chains. The security policy is translated and exported to the security mechanisms. The security policy is then enforced via the security mechanisms.

Loading the Abstract Image... loading....

First Claim

See full text

all claims..

Related Publications

Loading Related Publications... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
MCAFEE, INC.SANTA CLARA, CA855

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Bogle, Jessica Roseville, MN 3 65
O'Brien, Richard Baltimore, MD 35 276
Payne, Charles Oakdale, MN 3 65
Thomsen, Daniel Jay Minneapolis, MN 3 65

Cited Art Landscape

Patent Info (Count) # Cites Year
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (2)
6,035,399 Checkpoint object 26 1995
5,826,239 Distributed workflow resource management system and method 270 1996
 
ACCENTURE GLOBAL SERVICES LIMITED (1)
6,324,647 System, method and article of manufacture for security management in a development architecture framework 239 1999
 
IPG HEALTHCARE 501 LIMITED (1)
5,335,346 Access control policies for an object oriented database, including access control lists which span across object boundaries 259 1991
 
MCAFEE, INC. (1)
6,357,010 System and method for controlling access to documents stored on an internal network 141 1998
 
PTC INC. (1)
5,745,687 System for distributed workflow in which a routing node selects next node to be performed within a workflow procedure 86 1997
 
The United States of America as represented by the Secretary of Commerce (1)
6,088,679 Workflow management employing role-based access control 206 1997

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
INTELLECTUAL VENTURES I LLC (33)
7,950,066 Method and system for restricting use of a clipboard application 13 2001
8,065,713 System and method for providing multi-location access management to secured items 15 2002
7,681,034 Method and apparatus for securing electronic data 22 2002
7,921,288 System and method for providing different levels of key security for controlling access to secured items 15 2002
7,631,184 System and method for imposing security on copies of secured items 23 2002
7,565,683 Method and system for implementing changes to security policies in a distributed security system 24 2002
7,478,418 Guaranteed delivery of changes to security policies in a distributed system 26 2002
7,729,995 Managing secured files in designated locations 19 2002
7,562,232 System and method for providing manageability to security information for secured items 23 2002
7,512,810 Method and system for protecting encrypted files transmitted over a network 28 2002
8,006,280 Security system for generating keys from access rules in a decentralized manner and methods therefor 8 2002
8,176,334 Document security system that permits external users to gain access to secured files 2 2002
7,836,310 Security system that uses indirect password-based encryption 7 2002
7,921,450 Security system using indirect key generation from access rules and methods therefor 8 2002
7,890,990 Security system with staging capabilities 5 2002
7,577,838 Hybrid systems for securing digital assets 5 2002
7,930,756 Multi-level cryptographic transformations for securing digital assets 9 2003
7,730,543 Method and system for enabling users of a group shared across multiple file security systems to access secured files 17 2003
7,555,558 Method and system for fault-tolerant transfer of files across a network 17 2003
8,127,366 Method and apparatus for transitioning between states of security policies used to secure electronic documents 4 2003
7,703,140 Method and system for securing digital assets using process-driven security policies 19 2003
7,748,045 Method and system for providing cryptographic document retention with off-line access 16 2004
7,707,427 Multi-level file digests 17 2004
RE41546 Method and system for managing security tiers 10 2007
7,913,311 Methods and systems for providing access control to electronic data 14 2007
8,543,827 Methods and systems for providing access control to secured data 0 2008
RE43906 Method and apparatus for securing digital assets 1 2008
8,307,067 Protecting encrypted files transmitted over a network 34 2009
8,266,674 Method and system for implementing changes to security policies in a distributed security system 0 2009
8,327,138 Method and system for securing digital assets using process-driven security policies 2 2010
8,301,896 Multi-level file digests 0 2010
8,341,407 Method and system for protecting electronic data in enterprise environment 0 2011
8,341,406 System and method for providing different levels of key security for controlling access to secured items 0 2011
 
ORACLE INTERNATIONAL CORPORATION (7)
8,015,600 Employing electronic certificate workflows 2 2001
7,937,655 Workflows with associated processes 6 2001
7,802,174 Domain based workflows 9 2001
7,711,818 Support for multiple data stores 8 2001
7,581,011 Template based workflow definition 27 2001
7,840,658 Employing job code attributes in provisioning 5 2002
7,673,047 Determining a user's groups 8 2006
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (5)
8,423,394 Method for tracking the status of a workflow using weblogs 0 2003
8,140,691 Role-based views access to a workflow weblog 0 2004
8,417,682 Visualization of attributes of workflow weblogs 0 2005
8,458,337 Methods and apparatus for scoped role-based access control 0 2008
8,640,195 Method and system for automating security policy definition based on recorded transactions 0 2009
 
CLEVERSAFE, INC. (1)
8,649,399 Check operation dispersed storage network frame 0 2011
 
HONEYWELL INTERNATIONAL INC. (1)
8,572,404 Security and safety manager implementation in a multi-core processor 0 2011
 
INTELLECTUAL VENTURES I LLC (1)
8,613,102 Method and system for providing document retention using cryptography 0 2004
 
MCAFEE, INC. (1)
8,181,222 Locally adaptable central security management in a heterogeneous network environment 0 2007
 
MICROSOFT CORPORATION (1)
8,478,715 Extending OLAP navigation employing analytic workflows 0 2008
 
PERVASIVE SECURITY SYSTEM, INC. (1)
7,921,284 Method and system for protecting electronic data in enterprise environment 12 2002
 
SAP AG (1)
7,885,847 End user oriented workflow approach including structured processing of ad hoc workflows with a collaborative process engine 3 2004
 
SOFTWARE AG (1)
8,484,714 Method and rule-repository for generating security-definitions for heterogeneous systems 0 2008
 
ULTIMUS, INC. (1)
7,765,291 Business process management/workflow automation software 1 2004
 
UNITED STATES POSTAL SERVICE (1)
8,601,049 System and method for providing centralized management and distribution of information to remote users 0 2004

Maintenance Fees

Fee Large entity fee small entity fee micro entity fee due date
7.5 Year Payment $3600.00 $1800.00 $900.00 Jun 11, 2015
11.5 Year Payment $7400.00 $3700.00 $1850.00 Jun 11, 2019
Fee Large entity fee small entity fee micro entity fee
Surcharge - 7.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge - 11.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge after expiration - Late payment is unavoidable $700.00 $350.00 $175.00
Surcharge after expiration - Late payment is unintentional $1,640.00 $820.00 $410.00