Locally adaptable central security management in a heterogeneous network environment

Number of patents in Portfolio can not be more than 2000

United States of America Patent

PATENT NO 7308702
SERIAL NO

09483164

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A system and method for defining and enforcing a security policy. Security mechanism application specific information for each security mechanism is encapsulated as a key and exported to a semantic layer. Keys are combined to form key chains within the semantic layer. The key chains are in turn encapsulated as keys and passed to another semantic layer. A security policy is defined by forming key chains from keys and associating users with the key chains. The security policy is translated and exported to the security mechanisms. The security policy is then enforced via the security mechanisms.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
MCAFEE, INC.SANTA CLARA, CA1120

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Bogle, Jessica Roseville, MN 2 114
O'Brien, Richard Brooklyn Park, MN 32 376
Payne, Charles Oakdale, MN 3 114
Thomsen, Daniel Jay Minneapolis, MN 3 115

Cited Art Landscape

Patent Info (Count) # Cites Year
 
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP (2)
* 6035399 Checkpoint object 31 1995
5826239 Distributed workflow resource management system and method 322 1996
 
The United States of America as represented by the Secretary of Commerce (1)
* 6088679 Workflow management employing role-based access control 259 1997
 
IPG HEALTHCARE 501 LIMITED (1)
* 5335346 Access control policies for an object oriented database, including access control lists which span across object boundaries 299 1991
 
PTC INC. (1)
* 5745687 System for distributed workflow in which a routing node selects next node to be performed within a workflow procedure 109 1997
 
ACCENTURE GLOBAL SERVICES LIMITED (1)
* 6324647 System, method and article of manufacture for security management in a development architecture framework 286 1999
 
MCAFEE, INC. (1)
* 6357010 System and method for controlling access to documents stored on an internal network 214 1998
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (14)
* 8423394 Method for tracking the status of a workflow using weblogs 0 2003
* 2005/0131,750 Method for tracking the status of a workflow using weblogs 17 2003
8140691 Role-based views access to a workflow weblog 1 2004
8417682 Visualization of attributes of workflow weblogs 2 2005
* 8887241 Virtual roles 0 2006
* 2007/0198,522 Virtual roles 3 2006
* 2008/0005,115 Methods and apparatus for scoped role-based access control 10 2006
* 2009/0012,987 METHOD AND SYSTEM FOR DELIVERING ROLE-APPROPRIATE POLICIES 6 2007
* 8458337 Methods and apparatus for scoped role-based access control 17 2008
* 2008/0243,856 Methods and Apparatus for Scoped Role-Based Access Control 3 2008
8640195 Method and system for automating security policy definition based on recorded transactions 1 2009
* 2011/0078,759 Method and System For Automating Security Policy Definition Based On Recorded Transactions 1 2009
* 8649399 Check operation dispersed storage network frame 1 2011
* 2011/0264,950 CHECK OPERATION DISPERSED STORAGE NETWORK FRAME 9 2011
 
ULTIMUS, INC. (1)
* 7765291 Business process management/workflow automation software 7 2004
 
SAP SE (2)
* 7885847 End user oriented workflow approach including structured processing of ad hoc workflows with a collaborative process engine 11 2004
* 2005/0027,585 End user oriented workflow approach including structured processing of ad hoc workflows with a collaborative process engine 41 2004
 
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP (2)
* 2012/0246,695 ACCESS CONTROL OF DISTRIBUTED COMPUTING RESOURCES SYSTEM AND METHOD 5 2009
9479539 Distributed network instrumentation system 0 2015
 
BUSINESS OBJECTS SOFTWARE LTD. (1)
* 2011/0055,890 METHOD AND SYSTEM TO CONFIGURE SECURITY RIGHTS BASED ON CONTEXTUAL INFORMATION 4 2009
 
HONEYWELL INTERNATIONAL INC. (1)
8572404 Security and safety manager implementation in a multi-core processor 0 2011
 
ADVENTIUM ENTERPRISES, LLC (2)
9485218 Device for preventing, detecting and responding to security threats 0 2010
* 2011/0238,979 Device for Preventing, Detecting and Responding to Security Threats 2 2010
 
AMAZON TECHNOLOGIES, INC. (1)
* 9083749 Managing multiple security policy representations in a distributed environment 1 2012
 
FLASH NETWORKS LTD. (2)
* 8972518 Integrated data-model and flow based policy system 0 2007
* 2009/0083,408 INTEGRATED DATA-MODEL AND FLOW BASED POLICY SYSTEM 7 2007
 
SecurityProfiling, LLC (9)
9117069 Real-time vulnerability monitoring 1 2013
9350752 Anti-vulnerability system, method, and computer program product 0 2014
9118708 Multi-path remediation 0 2014
9118709 Anti-vulnerability system, method, and computer program product 0 2014
9100431 Computer program product and apparatus for multi-path remediation 0 2014
8984644 Anti-vulnerability system, method, and computer program product 2 2014
9118710 System, method, and computer program product for reporting an occurrence in different manners 0 2014
9118711 Anti-vulnerability system, method, and computer program product 0 2014
9225686 Anti-vulnerability system, method, and computer program product 0 2015
 
INTELLECTUAL VENTURES I LLC (5)
8341407 Method and system for protecting electronic data in enterprise environment 1 2011
8341406 System and method for providing different levels of key security for controlling access to secured items 0 2011
8739302 Method and apparatus for transitioning between states of security policies used to secure electronic documents 1 2012
8943316 Document security system that permits external users to gain access to secured files 0 2012
9129120 Methods and systems for providing access control to secured data 4 2014
 
ORACLE INTERNATIONAL CORPORATION (11)
8015600 Employing electronic certificate workflows 4 2001
7937655 Workflows with associated processes 13 2001
7802174 Domain based workflows 18 2001
7711818 Support for multiple data stores 11 2001
* 7581011 Template based workflow definition 46 2001
7840658 Employing job code attributes in provisioning 8 2002
7673047 Determining a user's groups 11 2006
* 9569725 Techniques for extracting semantic data stores 0 2009
* 2011/0093,469 TECHNIQUES FOR EXTRACTING SEMANTIC DATA STORES 5 2009
9235649 Domain based workflows 0 2010
8756191 Massively scalable reasoning architecture 1 2013
 
UNITED STATES POSTAL SERVICE (3)
* 8601049 System and method for providing centralized management and distribution of information to remote users 1 2004
* 2005/0197,871 System and method for providing centralized management and distribution of information to remote users 19 2004
9293030 System and method for providing centralized management and distribution of information to remote users 0 2013
 
INTELLECTUAL VENTURES I LLC (36)
7950066 Method and system for restricting use of a clipboard application 79 2001
8065713 System and method for providing multi-location access management to secured items 38 2002
7681034 Method and apparatus for securing electronic data 37 2002
7921288 System and method for providing different levels of key security for controlling access to secured items 55 2002
7631184 System and method for imposing security on copies of secured items 31 2002
7565683 Method and system for implementing changes to security policies in a distributed security system 36 2002
7478418 Guaranteed delivery of changes to security policies in a distributed system 46 2002
7729995 Managing secured files in designated locations 32 2002
7562232 System and method for providing manageability to security information for secured items 31 2002
7512810 Method and system for protecting encrypted files transmitted over a network 39 2002
8006280 Security system for generating keys from access rules in a decentralized manner and methods therefor 18 2002
8176334 Document security system that permits external users to gain access to secured files 13 2002
7836310 Security system that uses indirect password-based encryption 11 2002
7921450 Security system using indirect key generation from access rules and methods therefor 35 2002
7890990 Security system with staging capabilities 10 2002
7577838 Hybrid systems for securing digital assets 15 2002
7930756 Multi-level cryptographic transformations for securing digital assets 19 2003
8707034 Method and system for using remote headers to secure electronic files 6 2003
7730543 Method and system for enabling users of a group shared across multiple file security systems to access secured files 35 2003
7555558 Method and system for fault-tolerant transfer of files across a network 25 2003
8127366 Method and apparatus for transitioning between states of security policies used to secure electronic documents 11 2003
* 7703140 Method and system for securing digital assets using process-driven security policies 36 2003
8613102 Method and system for providing document retention using cryptography 42 2004
7748045 Method and system for providing cryptographic document retention with off-line access 28 2004
7707427 Multi-level file digests 25 2004
RE41546 Method and system for managing security tiers 15 2007
7913311 Methods and systems for providing access control to electronic data 29 2007
8543827 Methods and systems for providing access control to secured data 4 2008
RE43906 Method and apparatus for securing digital assets 6 2008
8307067 Protecting encrypted files transmitted over a network 120 2009
8266674 Method and system for implementing changes to security policies in a distributed security system 1 2009
8327138 Method and system for securing digital assets using process-driven security policies 3 2010
8301896 Multi-level file digests 0 2010
8918839 System and method for providing multi-location access management to secured items 2 2011
9542560 Methods and systems for providing access control to secured data 0 2013
9286484 Method and system for providing document retention using cryptography 0 2013
 
MICROSOFT TECHNOLOGY LICENSING, LLC (3)
* 8478715 Extending OLAP navigation employing analytic workflows 2 2008
* 2009/0287,675 Extending OLAP Navigation Employing Analytic Workflows 2 2008
9244998 Extending olap navigation employing analytic workflows 0 2013
 
SOFTWARE AG (2)
8484714 Method and rule-repository for generating security-definitions for heterogeneous systems 0 2008
* 2010/0083,348 Method and rule-repository for generating security-definitions for heterogeneous systems 0 2008
 
HYTRUST, INC. (1)
* 9578066 Systems and method for assuring security governance in managed computer systems 0 2016
 
PERVASIVE SECURITY SYSTEM, INC. (1)
7921284 Method and system for protecting electronic data in enterprise environment 23 2002
 
MCAFEE, INC. (2)
8181222 Locally adaptable central security management in a heterogeneous network environment 11 2007
* 2008/0066,151 Locally adaptable central security management in a heterogeneous network environment 21 2007
* Cited By Examiner

Maintenance Fees

Fee Large entity fee small entity fee micro entity fee due date
11.5 Year Payment $7400.00 $3700.00 $1850.00 Jun 11, 2019
Fee Large entity fee small entity fee micro entity fee
Surcharge - 11.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge after expiration - Late payment is unavoidable $700.00 $350.00 $175.00
Surcharge after expiration - Late payment is unintentional $1,640.00 $820.00 $410.00