WO2007120360A3 - Information management system - Google Patents

Information management system Download PDF

Info

Publication number
WO2007120360A3
WO2007120360A3 PCT/US2006/062586 US2006062586W WO2007120360A3 WO 2007120360 A3 WO2007120360 A3 WO 2007120360A3 US 2006062586 W US2006062586 W US 2006062586W WO 2007120360 A3 WO2007120360 A3 WO 2007120360A3
Authority
WO
WIPO (PCT)
Prior art keywords
policy
policies
management system
information management
abstractions
Prior art date
Application number
PCT/US2006/062586
Other languages
French (fr)
Other versions
WO2007120360A2 (en
Inventor
Keng Lim
Original Assignee
Blue Jungle
Keng Lim
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/383,164 external-priority patent/US9942271B2/en
Priority claimed from US11/383,159 external-priority patent/US8627490B2/en
Priority claimed from US11/383,161 external-priority patent/US8621549B2/en
Application filed by Blue Jungle, Keng Lim filed Critical Blue Jungle
Publication of WO2007120360A2 publication Critical patent/WO2007120360A2/en
Publication of WO2007120360A3 publication Critical patent/WO2007120360A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/13File access structures, e.g. distributed indices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/122File system administration, e.g. details of archiving or snapshots using management policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/176Support for shared access to files; File sharing support
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/93Document management systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/468Specific access rights for resources, e.g. using capability register
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Abstract

An information management system manages access to information. A policy language for an information management system allows specifying one or more policies using policy abstractions. The policies and policy abstractions are decoupled from one another, so policies and policy abstractions may be specified and altered separately from each other. A policy may refer to any number of policy abstractions. Multiple policies may reference a single policy abstraction, and a change to that policy abstraction will result in multiple policies being changed. Further, policy abstractions may be nested, so one policy abstraction may reference another policy abstraction, and so forth.
PCT/US2006/062586 2005-12-29 2006-12-22 Information management system WO2007120360A2 (en)

Applications Claiming Priority (16)

Application Number Priority Date Filing Date Title
US75501905P 2005-12-29 2005-12-29
US76603605P 2005-12-29 2005-12-29
US60/766,036 2005-12-29
US60/755,019 2005-12-29
US74312106P 2006-01-11 2006-01-11
US60/743,121 2006-01-11
US11/383,159 2006-05-12
US11/383,164 US9942271B2 (en) 2005-12-29 2006-05-12 Information management system with two or more interactive enforcement points
US11/383,159 US8627490B2 (en) 2005-12-29 2006-05-12 Enforcing document control in an information management system
US11/383,161 2006-05-12
US11/383,164 2006-05-12
US11/383,161 US8621549B2 (en) 2005-12-29 2006-05-12 Enforcing control policies in an information management system
US82105006P 2006-08-01 2006-08-01
US60/821,050 2006-08-01
US87019506P 2006-12-15 2006-12-15
US60/870,195 2006-12-15

Publications (2)

Publication Number Publication Date
WO2007120360A2 WO2007120360A2 (en) 2007-10-25
WO2007120360A3 true WO2007120360A3 (en) 2007-12-27

Family

ID=38225826

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2006/062586 WO2007120360A2 (en) 2005-12-29 2006-12-22 Information management system

Country Status (2)

Country Link
US (20) US9081981B2 (en)
WO (1) WO2007120360A2 (en)

Families Citing this family (572)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8352400B2 (en) 1991-12-23 2013-01-08 Hoffberg Steven M Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore
US7966078B2 (en) 1999-02-01 2011-06-21 Steven Hoffberg Network media appliance system and method
US7305700B2 (en) 2002-01-08 2007-12-04 Seven Networks, Inc. Secure transport for mobile communication network
US7356836B2 (en) * 2002-06-28 2008-04-08 Microsoft Corporation User controls for a computer
EP1540446A2 (en) 2002-08-27 2005-06-15 TD Security, Inc., dba Trust Digital, LLC Enterprise-wide security system for computer devices
US7958144B2 (en) * 2002-08-30 2011-06-07 Boss Logic, Llc System and method for secure reciprocal exchange of data
US7461172B2 (en) * 2002-12-12 2008-12-02 Xerox Corporation Methods, apparatus, and program products for configuring components in networked computing environments
US7624143B2 (en) * 2002-12-12 2009-11-24 Xerox Corporation Methods, apparatus, and program products for utilizing contextual property metadata in networked computing environments
US20040187029A1 (en) * 2003-03-21 2004-09-23 Ting David M. T. System and method for data and request filtering
US7797348B2 (en) * 2003-05-01 2010-09-14 The Hong Kong Polytechnic University Data structure and system for IP address lookup and IP address lookup system
US8015301B2 (en) * 2003-09-30 2011-09-06 Novell, Inc. Policy and attribute based access to a resource
US7299493B1 (en) * 2003-09-30 2007-11-20 Novell, Inc. Techniques for dynamically establishing and managing authentication and trust relationships
US7467415B2 (en) * 2003-09-30 2008-12-16 Novell, Inc. Distributed dynamic security for document collaboration
WO2005064498A1 (en) 2003-12-23 2005-07-14 Trust Digital, Llc System and method for enforcing a security policy on mobile devices using dynamically generated security profiles
US8892530B1 (en) * 2004-05-28 2014-11-18 Amdocs, Inc. Policy configuration user interface
JP4341517B2 (en) * 2004-06-21 2009-10-07 日本電気株式会社 Security policy management system, security policy management method and program
US7543144B2 (en) * 2004-07-21 2009-06-02 Beachhead Solutions System and method for lost data destruction of electronic data stored on portable electronic devices
US7421589B2 (en) * 2004-07-21 2008-09-02 Beachhead Solutions, Inc. System and method for lost data destruction of electronic data stored on a portable electronic device using a security interval
US7540016B2 (en) * 2004-07-21 2009-05-26 Beachhead Solutions, Inc. System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall
US7774365B2 (en) * 2004-08-31 2010-08-10 Morgan Stanley Organizational reference data and entitlement system
US7984187B2 (en) * 2004-09-02 2011-07-19 Jds Uniphase Corporation System and method for constructing transactions from electronic content
US8495700B2 (en) 2005-02-28 2013-07-23 Mcafee, Inc. Mobile data security system and methods
US20100115581A1 (en) * 2008-11-06 2010-05-06 Trust Digital System method and device for mediating connections between policy source servers, corporate respositories, and mobile devices
JP4260128B2 (en) * 2005-03-17 2009-04-30 富士通株式会社 Business skill estimation program
US8438633B1 (en) 2005-04-21 2013-05-07 Seven Networks, Inc. Flexible real-time inbox access
US8578500B2 (en) * 2005-05-31 2013-11-05 Kurt James Long System and method of fraud and misuse detection
WO2006128248A1 (en) * 2005-06-02 2006-12-07 National Ict Australia Limited Multimodal computer navigation
US9401822B2 (en) * 2005-06-09 2016-07-26 Whirlpool Corporation Software architecture system and method for operating an appliance exposing key press functionality to a network
WO2006136660A1 (en) 2005-06-21 2006-12-28 Seven Networks International Oy Maintaining an ip connection in a mobile network
US7827593B2 (en) * 2005-06-29 2010-11-02 Intel Corporation Methods, apparatuses, and systems for the dynamic evaluation and delegation of network access control
US8155696B2 (en) * 2005-12-02 2012-04-10 At&T Mobility Ii Llc Devices, systems and methods for scenario based services and intelligent user feedback
US7774363B2 (en) * 2005-12-29 2010-08-10 Nextlabs, Inc. Detecting behavioral patterns and anomalies using information usage data
US20070162417A1 (en) * 2006-01-10 2007-07-12 Kabushiki Kaisha Toshiba System and method for selective access to restricted electronic documents
US9600568B2 (en) 2006-01-23 2017-03-21 Veritas Technologies Llc Methods and systems for automatic evaluation of electronic discovery review and productions
US9275129B2 (en) 2006-01-23 2016-03-01 Symantec Corporation Methods and systems to efficiently find similar and near-duplicate emails and files
US7657603B1 (en) * 2006-01-23 2010-02-02 Clearwell Systems, Inc. Methods and systems of electronic message derivation
US7899871B1 (en) 2006-01-23 2011-03-01 Clearwell Systems, Inc. Methods and systems for e-mail topic classification
US7743051B1 (en) 2006-01-23 2010-06-22 Clearwell Systems, Inc. Methods, systems, and user interface for e-mail search and retrieval
US8392409B1 (en) 2006-01-23 2013-03-05 Symantec Corporation Methods, systems, and user interface for E-mail analysis and review
US7987264B1 (en) 2006-01-27 2011-07-26 Juniper Networks, Inc. Testing policies in a network
US20070220143A1 (en) * 2006-03-20 2007-09-20 Postini, Inc. Synchronous message management system
US8888585B1 (en) * 2006-05-10 2014-11-18 Mcafee, Inc. Game console system, method and computer program product with anti-malware/spyware and parental control capabilities
JP4838631B2 (en) * 2006-05-17 2011-12-14 富士通株式会社 Document access management program, document access management apparatus, and document access management method
US7882539B2 (en) * 2006-06-02 2011-02-01 Microsoft Corporation Abstracting security policy from, and transforming to, native representations of access check mechanisms
US7971257B2 (en) * 2006-08-03 2011-06-28 Symantec Corporation Obtaining network origins of potential software threats
JP4821539B2 (en) * 2006-09-27 2011-11-24 富士ゼロックス株式会社 Information processing system and information processing program
US20080083027A1 (en) * 2006-09-29 2008-04-03 Colorquick, L.L.C. Document Editing Environment that Varies Based Upon Security Level of User Who Performs the Editing
US8234302B1 (en) 2006-09-29 2012-07-31 Amazon Technologies, Inc. Controlling access to electronic content
US8234640B1 (en) 2006-10-17 2012-07-31 Manageiq, Inc. Compliance-based adaptations in managed virtual systems
US9038062B2 (en) * 2006-10-17 2015-05-19 Manageiq, Inc. Registering and accessing virtual systems for use in a managed system
US8234641B2 (en) 2006-10-17 2012-07-31 Managelq, Inc. Compliance-based adaptations in managed virtual systems
US8949825B1 (en) 2006-10-17 2015-02-03 Manageiq, Inc. Enforcement of compliance policies in managed virtual systems
US9697019B1 (en) 2006-10-17 2017-07-04 Manageiq, Inc. Adapt a virtual machine to comply with system enforced policies and derive an optimized variant of the adapted virtual machine
US9015703B2 (en) 2006-10-17 2015-04-21 Manageiq, Inc. Enforcement of compliance policies in managed virtual systems
US8949826B2 (en) * 2006-10-17 2015-02-03 Managelq, Inc. Control and management of virtual systems
US8458695B2 (en) 2006-10-17 2013-06-04 Manageiq, Inc. Automatic optimization for virtual systems
US8612971B1 (en) 2006-10-17 2013-12-17 Manageiq, Inc. Automatic optimization for virtual systems
US9086917B1 (en) 2006-10-17 2015-07-21 Manageiq, Inc. Registering and accessing virtual systems for use in a managed system
US8752045B2 (en) 2006-10-17 2014-06-10 Manageiq, Inc. Methods and apparatus for using tags to control and manage assets
US8259568B2 (en) 2006-10-23 2012-09-04 Mcafee, Inc. System and method for controlling mobile device access to a network
US20080104661A1 (en) * 2006-10-27 2008-05-01 Joseph Levin Managing Policy Settings for Remote Clients
US9218213B2 (en) 2006-10-31 2015-12-22 International Business Machines Corporation Dynamic placement of heterogeneous workloads
US8799448B2 (en) * 2006-12-20 2014-08-05 Microsoft Corporation Generating rule packs for monitoring computer systems
US8312558B2 (en) 2007-01-03 2012-11-13 At&T Intellectual Property I, L.P. System and method of managing protected video content
US8510467B2 (en) * 2007-01-11 2013-08-13 Ept Innovation Monitoring a message associated with an action
US20080178253A1 (en) * 2007-01-22 2008-07-24 Antti Laurila User Access Policy for Storing Offline
US20080178256A1 (en) * 2007-01-23 2008-07-24 Brian Perrone System and method providing policy based control of interaction between client computer users and client computer software programs
US9092434B2 (en) 2007-01-23 2015-07-28 Symantec Corporation Systems and methods for tagging emails by discussions
US20080189767A1 (en) * 2007-02-01 2008-08-07 Microsoft Corporation Accessing file resources outside a security boundary
US7870596B2 (en) * 2007-02-01 2011-01-11 Microsoft Corporation Accessing network resources outside a security boundary
US10108437B2 (en) * 2007-02-12 2018-10-23 Adobe Systems Incorporated Rendition of a content editor
US20080208926A1 (en) * 2007-02-22 2008-08-28 Smoot Peter L Data management in a data storage system using data sets
US7953928B2 (en) * 2007-02-22 2011-05-31 Network Appliance, Inc. Apparatus and a method to make data sets conform to data management policies
US8631147B2 (en) 2007-03-12 2014-01-14 Citrix Systems, Inc. Systems and methods for configuring policy bank invocations
US8490148B2 (en) * 2007-03-12 2013-07-16 Citrix Systems, Inc Systems and methods for managing application security profiles
US8683060B2 (en) 2007-03-13 2014-03-25 Adobe Systems Incorporated Accessing media
US8732800B1 (en) * 2007-03-26 2014-05-20 Jerry Askew Systems and methods for centralized management of policies and access controls
US7904557B1 (en) * 2007-03-26 2011-03-08 Emc Corporation Granting access to a content unit stored on an object addressable storage system
US8611867B2 (en) * 2007-03-27 2013-12-17 At&T Mobility Ii Llc Systems and methods for profile-based mobile commerce
US10089210B2 (en) * 2007-03-29 2018-10-02 Microsoft Technology Licensing, Llc Auto-generation of provider functionality
US7904965B1 (en) * 2007-03-30 2011-03-08 Emc Corporation User action security auditing
US7756987B2 (en) 2007-04-04 2010-07-13 Microsoft Corporation Cybersquatter patrol
TW200842711A (en) * 2007-04-30 2008-11-01 Wistron Corp Method for installing a computer operating system through add-on disk image files
US9405585B2 (en) * 2007-04-30 2016-08-02 International Business Machines Corporation Management of heterogeneous workloads
US8073423B2 (en) * 2007-05-25 2011-12-06 At&T Mobility Ii Llc Intelligent information control repository
US7873635B2 (en) * 2007-05-31 2011-01-18 Microsoft Corporation Search ranger system and double-funnel model for search spam analyses and browser protection
US9430577B2 (en) * 2007-05-31 2016-08-30 Microsoft Technology Licensing, Llc Search ranger system and double-funnel model for search spam analyses and browser protection
US8667117B2 (en) 2007-05-31 2014-03-04 Microsoft Corporation Search ranger system and double-funnel model for search spam analyses and browser protection
US8805425B2 (en) 2007-06-01 2014-08-12 Seven Networks, Inc. Integrated messaging
KR101368912B1 (en) * 2007-06-11 2014-02-27 삼성전자주식회사 Method for controlling home network devices using Rich Site Summary service and apparatus therefor
US8561148B2 (en) * 2008-06-26 2013-10-15 Citrix Systems, Inc. Methods and systems for interactive evaluation using dynamically generated, interactive resultant sets of policies
US8775944B2 (en) * 2008-06-26 2014-07-08 Citrix Systems, Inc. Methods and systems for interactive evaluation of policies
US20090007021A1 (en) * 2007-06-28 2009-01-01 Richard Hayton Methods and systems for dynamic generation of filters using a graphical user interface
US20090006618A1 (en) * 2007-06-28 2009-01-01 Richard Hayton Methods and systems for access routing and resource mapping using filters
US20090006316A1 (en) * 2007-06-29 2009-01-01 Wenfei Fan Methods and Apparatus for Rewriting Regular XPath Queries on XML Views
US7996879B1 (en) * 2007-07-03 2011-08-09 Trend Micro Incorporated Network deployment techniques employing radio frequency identification (RFID)
US20090012987A1 (en) * 2007-07-05 2009-01-08 Kaminsky David L Method and system for delivering role-appropriate policies
US20090019121A1 (en) * 2007-07-10 2009-01-15 Messagelabs Limited Message processing
US20090030705A1 (en) * 2007-07-23 2009-01-29 Michel Shane Simpson Project management black box protections
WO2009018483A1 (en) * 2007-07-31 2009-02-05 Viasat, Inc. Input output access controller
US8087061B2 (en) * 2007-08-07 2011-12-27 Microsoft Corporation Resource-reordered remediation of malware threats
US20090043650A1 (en) * 2007-08-08 2009-02-12 Legalforce, Inc. Segmented services having a global structure of networked independent entities
US20090043621A1 (en) * 2007-08-09 2009-02-12 David Kershaw System and Method of Team Performance Management Software
CN101369249B (en) * 2007-08-14 2011-08-17 国际商业机器公司 Method and apparatus for marking GUI component of software
US8756649B2 (en) * 2007-08-14 2014-06-17 International Business Machines Corporation Language-agnostic policy management
US8245271B2 (en) * 2007-08-15 2012-08-14 Oracle International Corporation Scope-centric access control model
JP2009059247A (en) * 2007-08-31 2009-03-19 Fuji Xerox Co Ltd Electronic information management apparatus and access control program
US8146098B2 (en) * 2007-09-07 2012-03-27 Manageiq, Inc. Method and apparatus for interfacing with a computer user via virtual thumbnails
US8024771B2 (en) * 2007-09-19 2011-09-20 International Business Machines Corporation Policy-based method for configuring an access control service
US8621550B1 (en) * 2007-09-28 2013-12-31 Emc Corporation Information technology resource compliance templates
US7971231B2 (en) * 2007-10-02 2011-06-28 International Business Machines Corporation Configuration management database (CMDB) which establishes policy artifacts and automatic tagging of the same
US8539568B1 (en) 2007-10-03 2013-09-17 Courion Corporation Identity map creation
US8150820B1 (en) * 2007-10-04 2012-04-03 Adobe Systems Incorporated Mechanism for visible users and groups
JP4980840B2 (en) * 2007-10-11 2012-07-18 株式会社リコー Information processing apparatus and information processing method
US8793781B2 (en) * 2007-10-12 2014-07-29 International Business Machines Corporation Method and system for analyzing policies for compliance with a specified policy using a policy template
US7761471B1 (en) * 2007-10-16 2010-07-20 Jpmorgan Chase Bank, N.A. Document management techniques to account for user-specific patterns in document metadata
US8316440B1 (en) * 2007-10-30 2012-11-20 Trend Micro, Inc. System for detecting change of name-to-IP resolution
US7966665B1 (en) * 2007-11-16 2011-06-21 Open Invention Network, Llc Compliance validator for restricted network access control
US20090132404A1 (en) * 2007-11-21 2009-05-21 Marie King Apportioning fraud liability
US8407688B2 (en) * 2007-11-27 2013-03-26 Managelq, Inc. Methods and apparatus for storing and transmitting historical configuration data associated with information technology assets
US8418173B2 (en) 2007-11-27 2013-04-09 Manageiq, Inc. Locating an unauthorized virtual machine and bypassing locator code by adjusting a boot pointer of a managed virtual machine in authorized environment
WO2009076447A1 (en) * 2007-12-10 2009-06-18 Courion Corporaton Policy enforcement using esso
US9002828B2 (en) 2007-12-13 2015-04-07 Seven Networks, Inc. Predictive content delivery
US9984369B2 (en) 2007-12-19 2018-05-29 At&T Intellectual Property I, L.P. Systems and methods to identify target video content
US8037256B2 (en) * 2007-12-20 2011-10-11 Advanced Micro Devices, Inc. Programmable address processor for graphics applications
US9292661B2 (en) * 2007-12-20 2016-03-22 Adobe Systems Incorporated System and method for distributing rights-protected content
US8060596B1 (en) * 2007-12-26 2011-11-15 Symantec Corporation Methods and systems for normalizing data loss prevention categorization information
US20090171965A1 (en) * 2007-12-28 2009-07-02 Bruce Backa System and Method For Policy Based Control of NAS Storage Devices
US9323938B2 (en) * 2007-12-31 2016-04-26 Enterra Solutions, Llc Holistic XACML and obligation code automatically generated from ontologically defined rule set
US20090183225A1 (en) * 2008-01-10 2009-07-16 Microsoft Corporation Pluggable modules for terminal services
US8862657B2 (en) 2008-01-25 2014-10-14 Seven Networks, Inc. Policy based content service
US20090193338A1 (en) 2008-01-28 2009-07-30 Trevor Fiatal Reducing network and battery consumption during content delivery and playback
US20090208015A1 (en) * 2008-02-15 2009-08-20 Microsoft Corporation Offline consumption of protected information
US8631470B2 (en) * 2008-02-20 2014-01-14 Bruce R. Backa System and method for policy based control of NAS storage devices
US8549654B2 (en) 2008-02-20 2013-10-01 Bruce Backa System and method for policy based control of NAS storage devices
US8527868B2 (en) 2008-02-22 2013-09-03 International Business Machines Corporation Systems and methods for document annotation
US8656451B2 (en) * 2008-03-07 2014-02-18 At&T Mobility Ii Llc Policy application server for mobile data networks
US20100088232A1 (en) * 2008-03-21 2010-04-08 Brian Gale Verification monitor for critical test result delivery systems
US9070095B2 (en) * 2008-04-01 2015-06-30 Siemens Aktiengesellschaft Ensuring referential integrity of medical image data
US8225106B2 (en) * 2008-04-02 2012-07-17 Protegrity Corporation Differential encryption utilizing trust modes
US8171393B2 (en) * 2008-04-16 2012-05-01 Clearwell Systems, Inc. Method and system for producing and organizing electronically stored information
US8621608B2 (en) * 2008-04-29 2013-12-31 Mcafee, Inc. System, method, and computer program product for dynamically adjusting a level of security applied to a system
US8141129B2 (en) * 2008-05-29 2012-03-20 Microsoft Corporation Centrally accessible policy repository
US20090300019A1 (en) * 2008-05-30 2009-12-03 Schumberger Technology Corporation Hierarchical item level entitlement
US8495701B2 (en) 2008-06-05 2013-07-23 International Business Machines Corporation Indexing of security policies
WO2009153270A1 (en) * 2008-06-16 2009-12-23 Jime Sa A method for classifying information elements
US7739333B2 (en) * 2008-06-27 2010-06-15 Microsoft Corporation Management of organizational boundaries in unified communications systems
US8291433B2 (en) * 2008-06-27 2012-10-16 Microsoft Corporation Unified, configurable services stack for integration of enterprise applications
US9219733B2 (en) * 2008-06-30 2015-12-22 Microsoft Technology Licensing, Llc Software-based aliasing for accessing multiple shared resources on a single remote host
US8555333B2 (en) * 2008-08-18 2013-10-08 International Business Machines Corporation Identifying and resolving separation of duties conflicts in a multi-application environment
US8245282B1 (en) 2008-08-19 2012-08-14 Eharmony, Inc. Creating tests to identify fraudulent users
ATE544104T1 (en) * 2008-09-12 2012-02-15 Siemens Ag METHOD FOR GRANTING ACCESS AUTHORIZATION TO A COMPUTER-BASED OBJECT IN AN AUTOMATION SYSTEM, COMPUTER PROGRAM AND AUTOMATION SYSTEM
US8805887B2 (en) * 2008-10-03 2014-08-12 Microsoft Corporation Packaging system to facilitate declarative model-driven development
US8532978B1 (en) * 2008-10-31 2013-09-10 Afrl/Rij Natural language interface, compiler and de-compiler for security policies
US8909925B2 (en) 2008-11-17 2014-12-09 Prakash Baskaran System to secure electronic content, enforce usage policies and provide configurable functionalities
US9824071B2 (en) * 2008-12-03 2017-11-21 Microsoft Technology Licensing, Llc Viewing messages and message attachments in different languages
US20100144440A1 (en) * 2008-12-04 2010-06-10 Nokia Corporation Methods, apparatuses, and computer program products in social services
US8145073B2 (en) * 2008-12-04 2012-03-27 Xerox Corporation System and method for improving failure detection using collective intelligence with end-user feedback
US8677463B2 (en) * 2008-12-05 2014-03-18 At&T Intellectual Property I, Lp System and method for managing multiple sub accounts within a subcriber main account in a data distribution system
US20110208779A1 (en) * 2008-12-23 2011-08-25 Backa Bruce R System and Method for Policy Based Control of NAS Storage Devices
US8701047B2 (en) 2009-01-14 2014-04-15 Microsoft Corporation Configuration creation for deployment and monitoring
WO2010089952A1 (en) * 2009-02-06 2010-08-12 日本電気株式会社 Information management system
US8296564B2 (en) 2009-02-17 2012-10-23 Microsoft Corporation Communication channel access based on channel identifier and use policy
US9141692B2 (en) * 2009-03-05 2015-09-22 International Business Machines Corporation Inferring sensitive information from tags
US8386437B2 (en) * 2009-04-02 2013-02-26 Xerox Corporation Apparatus and method for document collection and filtering
US9805041B2 (en) * 2009-05-04 2017-10-31 Open Invention Network, Llc Policy based layered filesystem management
US20100306057A1 (en) * 2009-05-29 2010-12-02 Nokia Corporation Method and apparatus for providing actionable objects during periods of network unavailability
EP2441020A4 (en) * 2009-06-11 2013-04-03 Bruce R Backa System and method for end-user archiving
US20100333079A1 (en) * 2009-06-30 2010-12-30 Computer Associates Think, Inc. Binary Code Modification System and Method for Implementing Identity and Access Management or Governance Policies
US20100333065A1 (en) * 2009-06-30 2010-12-30 Computer Assoicates Think, Inc. Binary code modification system and method for implementing a web service interface
US8489685B2 (en) 2009-07-17 2013-07-16 Aryaka Networks, Inc. Application acceleration as a service system and method
US8914874B2 (en) * 2009-07-21 2014-12-16 Microsoft Corporation Communication channel claim dependent security precautions
CN101998660B (en) * 2009-08-12 2013-09-18 电信科学技术研究院 Method, system and device for sending signaling
US8768846B2 (en) * 2009-08-27 2014-07-01 International Business Machines Corporation System, method, and apparatus for management of media objects
KR101669287B1 (en) * 2009-09-01 2016-11-09 삼성전자주식회사 Method and apparatus for controlling remote user interface device through third remote user interface device
US8145948B2 (en) 2009-10-30 2012-03-27 International Business Machines Corporation Governance in work flow software
US10169723B2 (en) * 2009-11-11 2019-01-01 International Business Machines Corporation Distributed policy distribution for compliance functionality
US9038168B2 (en) * 2009-11-20 2015-05-19 Microsoft Technology Licensing, Llc Controlling resource access based on resource properties
US8688748B2 (en) * 2010-01-21 2014-04-01 Siemens Product Lifecycle Management Software Inc. Adaptive table sizing for multiple-attribute parameters
US8955043B2 (en) * 2010-01-27 2015-02-10 Microsoft Corporation Type-preserving compiler for security verification
US8595789B2 (en) * 2010-02-15 2013-11-26 Bank Of America Corporation Anomalous activity detection
US8898287B2 (en) * 2010-02-24 2014-11-25 Salesforce.Com, Inc. System, method and computer program product for monitoring data activity utilizing a shared data store
US8375056B2 (en) 2010-02-26 2013-02-12 International Business Machines Corporation Optimizing data cache when applying user-based security
EP2372570B1 (en) * 2010-03-30 2019-06-19 Telefonaktiebolaget LM Ericsson (publ) Secure and flexible access to electronic documents in databases
US9767136B2 (en) 2010-03-31 2017-09-19 Salesforce.Com, Inc. System, method and computer program product for maintaining data stored in a data structure
FR2958478B1 (en) * 2010-04-02 2012-05-04 Sergio Loureiro METHOD OF SECURING DATA AND / OR APPLICATIONS IN A CLOUD COMPUTING ARCHITECTURE
US9129000B2 (en) * 2010-04-30 2015-09-08 International Business Machines Corporation Method and system for centralized control of database applications
US8935384B2 (en) 2010-05-06 2015-01-13 Mcafee Inc. Distributed data revocation using data commands
US20110296430A1 (en) * 2010-05-27 2011-12-01 International Business Machines Corporation Context aware data protection
US8552833B2 (en) 2010-06-10 2013-10-08 Ricoh Company, Ltd. Security system for managing information on mobile wireless devices
US8365143B2 (en) 2010-06-15 2013-01-29 Microsoft Corporation Dynamic languages for static hosts
US9043433B2 (en) 2010-07-26 2015-05-26 Seven Networks, Inc. Mobile network traffic coordination across multiple applications
US8838783B2 (en) 2010-07-26 2014-09-16 Seven Networks, Inc. Distributed caching for resource and mobile network traffic management
WO2012016091A2 (en) 2010-07-28 2012-02-02 Nextlabs, Inc. Protecting documents using policies and encryption
CN101909058B (en) * 2010-07-30 2013-01-16 天维讯达无线电设备检测(北京)有限责任公司 Platform authentication strategy management method and system suitable for credible connecting architecture
US20120042354A1 (en) * 2010-08-13 2012-02-16 Morgan Stanley Entitlement conflict enforcement
JP5652047B2 (en) * 2010-08-13 2015-01-14 富士ゼロックス株式会社 Information processing apparatus and information processing program
CN103221958B (en) * 2010-09-24 2016-01-06 维萨国际服务协会 Use the method and system of general ID and biological characteristic
US8416709B1 (en) * 2010-09-28 2013-04-09 Amazon Technologies, Inc. Network data transmission analysis management
US8555383B1 (en) 2010-09-28 2013-10-08 Amazon Technologies, Inc. Network data transmission auditing
US8565108B1 (en) 2010-09-28 2013-10-22 Amazon Technologies, Inc. Network data transmission analysis
US8843153B2 (en) 2010-11-01 2014-09-23 Seven Networks, Inc. Mobile traffic categorization and policy for network use optimization while preserving user experience
WO2012060995A2 (en) 2010-11-01 2012-05-10 Michael Luna Distributed caching in a wireless network of content delivered for a mobile application over a long-held request
US8924964B2 (en) 2010-11-01 2014-12-30 Microsoft Corporation Dynamic allocation and assignment of virtual environment
US8782090B2 (en) * 2010-11-07 2014-07-15 International Business Machines Corporation Aiding report construction based on inference of implicit application level relationships
US9191408B2 (en) * 2010-11-08 2015-11-17 Axiomatics Ab System and method for performing partial evaluation in order to construct a simplified policy
US9589145B2 (en) 2010-11-24 2017-03-07 Oracle International Corporation Attaching web service policies to a group of policy subjects
US8650250B2 (en) 2010-11-24 2014-02-11 Oracle International Corporation Identifying compatible web service policies
US9021055B2 (en) 2010-11-24 2015-04-28 Oracle International Corporation Nonconforming web service policy functions
US8635682B2 (en) 2010-11-24 2014-01-21 Oracle International Corporation Propagating security identity information to components of a composite application
US20120150801A1 (en) * 2010-12-08 2012-06-14 Microsoft Corporation Platform agnostic file attribute synchronization
US10511630B1 (en) 2010-12-10 2019-12-17 CellSec, Inc. Dividing a data processing device into separate security domains
US8955035B2 (en) 2010-12-16 2015-02-10 Microsoft Corporation Anonymous principals for policy languages
US10304066B2 (en) * 2010-12-22 2019-05-28 Facebook, Inc. Providing relevant notifications for a user based on location and social information
US9208332B2 (en) * 2010-12-24 2015-12-08 Microsoft Technology Licensing, Llc Scoped resource authorization policies
JP5610530B2 (en) * 2010-12-27 2014-10-22 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Resource protection processing program, resource protection processing device, and resource protection processing method
US9237068B2 (en) * 2011-01-30 2016-01-12 Blue Coat Systems, Inc. System and method for distributing heuristics to network intermediary devices
US8719257B2 (en) 2011-02-16 2014-05-06 Symantec Corporation Methods and systems for automatically generating semantic/concept searches
US9165289B2 (en) 2011-02-28 2015-10-20 Ricoh Company, Ltd. Electronic meeting management for mobile wireless devices with post meeting processing
US9576257B2 (en) * 2011-03-21 2017-02-21 Sap Se Integrating data-handling policies into a workflow model
US20120246740A1 (en) * 2011-03-22 2012-09-27 Brooker Marc J Strong rights management for computing application functionality
US8843734B2 (en) * 2011-04-04 2014-09-23 Nextlabs, Inc. Protecting information using policies and encryption
US9229489B2 (en) * 2011-05-03 2016-01-05 Facebook, Inc. Adjusting mobile device state based on user intentions and/or identity
US8560819B2 (en) 2011-05-31 2013-10-15 Oracle International Corporation Software execution using multiple initialization modes
AU2012272509A1 (en) * 2011-06-21 2014-02-06 Jajoza Connected Solutions Pty Ltd A system and method for providing safety policies for communications and interaction
US9262519B1 (en) * 2011-06-30 2016-02-16 Sumo Logic Log data analysis
US8577963B2 (en) * 2011-06-30 2013-11-05 Amazon Technologies, Inc. Remote browsing session between client browser and network based browser
US9621406B2 (en) 2011-06-30 2017-04-11 Amazon Technologies, Inc. Remote browsing session management
US8706860B2 (en) * 2011-06-30 2014-04-22 Amazon Technologies, Inc. Remote browsing session management
US8799412B2 (en) 2011-06-30 2014-08-05 Amazon Technologies, Inc. Remote browsing session management
US9239800B2 (en) * 2011-07-27 2016-01-19 Seven Networks, Llc Automatic generation and distribution of policy information regarding malicious mobile traffic in a wireless network
US9497224B2 (en) 2011-08-09 2016-11-15 CloudPassage, Inc. Systems and methods for implementing computer security
US8412945B2 (en) 2011-08-09 2013-04-02 CloudPassage, Inc. Systems and methods for implementing security in a cloud computing environment
US9037696B2 (en) 2011-08-16 2015-05-19 Amazon Technologies, Inc. Managing information associated with network resources
US8707434B2 (en) 2011-08-17 2014-04-22 Mcafee, Inc. System and method for indirect interface monitoring and plumb-lining
US8600992B2 (en) * 2011-08-17 2013-12-03 International Business Machines Corporation Coordinating problem resolution in complex systems using disparate information sources
US8838581B2 (en) 2011-08-19 2014-09-16 Facebook, Inc. Sending notifications about other users with whom a user is likely to interact
US20130231971A1 (en) * 2011-08-23 2013-09-05 Judy Bishop Legal project management system and method
US9195768B2 (en) 2011-08-26 2015-11-24 Amazon Technologies, Inc. Remote browsing session management
US10089403B1 (en) 2011-08-31 2018-10-02 Amazon Technologies, Inc. Managing network based storage
US20130347054A1 (en) 2012-06-20 2013-12-26 Tetsuro Motoyama Approach For Managing Access To Data On Client Devices
US9118686B2 (en) * 2011-09-06 2015-08-25 Microsoft Technology Licensing, Llc Per process networking capabilities
US8990561B2 (en) 2011-09-09 2015-03-24 Microsoft Technology Licensing, Llc Pervasive package identifiers
US9800688B2 (en) 2011-09-12 2017-10-24 Microsoft Technology Licensing, Llc Platform-enabled proximity service
US8819491B2 (en) 2011-09-16 2014-08-26 Tripwire, Inc. Methods and apparatus for remediation workflow
US8862941B2 (en) 2011-09-16 2014-10-14 Tripwire, Inc. Methods and apparatus for remediation execution
US9152970B1 (en) 2011-09-27 2015-10-06 Amazon Technologies, Inc. Remote co-browsing session management
US9383958B1 (en) 2011-09-27 2016-07-05 Amazon Technologies, Inc. Remote co-browsing session management
US9178955B1 (en) 2011-09-27 2015-11-03 Amazon Technologies, Inc. Managing network based content
US8589385B2 (en) 2011-09-27 2013-11-19 Amazon Technologies, Inc. Historical browsing session management
US9641637B1 (en) 2011-09-27 2017-05-02 Amazon Technologies, Inc. Network resource optimization
US8914514B1 (en) 2011-09-27 2014-12-16 Amazon Technologies, Inc. Managing network based content
US8849802B2 (en) 2011-09-27 2014-09-30 Amazon Technologies, Inc. Historical browsing session management
US10693991B1 (en) 2011-09-27 2020-06-23 Amazon Technologies, Inc. Remote browsing session management
US8615431B1 (en) 2011-09-29 2013-12-24 Amazon Technologies, Inc. Network content message placement management
US9699170B2 (en) 2011-09-29 2017-07-04 Oracle International Corporation Bundled authorization requests
US8914843B2 (en) 2011-09-30 2014-12-16 Oracle International Corporation Conflict resolution when identical policies are attached to a single policy subject
US9667485B2 (en) 2011-10-04 2017-05-30 Juniper Networks, Inc. Methods and apparatus for a self-organized layer-2 enterprise network architecture
US10148550B1 (en) 2011-10-04 2018-12-04 Juniper Networks, Inc. Methods and apparatus for a scalable network with efficient link utilization
US9407457B2 (en) 2011-10-04 2016-08-02 Juniper Networks, Inc. Apparatuses for a wired/wireless network architecture
US8804620B2 (en) * 2011-10-04 2014-08-12 Juniper Networks, Inc. Methods and apparatus for enforcing a common user policy within a network
US9118687B2 (en) 2011-10-04 2015-08-25 Juniper Networks, Inc. Methods and apparatus for a scalable network with efficient link utilization
GB2568837B (en) * 2011-10-14 2019-08-14 Saas Document Solutions Ltd Controlling access to stored content
US9756501B2 (en) * 2011-10-24 2017-09-05 Blackberry Limited System and method for wireless device configuration
US8996350B1 (en) 2011-11-02 2015-03-31 Dub Software Group, Inc. System and method for automatic document management
US10291658B2 (en) * 2011-11-09 2019-05-14 Microsoft Technology Licensing, Llc Techniques to apply and share remote policies on mobile devices
US9313100B1 (en) 2011-11-14 2016-04-12 Amazon Technologies, Inc. Remote browsing session management
US8972477B1 (en) 2011-12-01 2015-03-03 Amazon Technologies, Inc. Offline browsing session management
WO2013086214A1 (en) 2011-12-06 2013-06-13 Seven Networks, Inc. A system of redundantly clustered machines to provide failover mechanisms for mobile traffic management and network resource conservation
EP2788889A4 (en) 2011-12-07 2015-08-12 Seven Networks Inc Flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation
US20220004649A1 (en) * 2011-12-09 2022-01-06 Sertainty Corporation System and methods for using cipher objects to protect data
US9117002B1 (en) 2011-12-09 2015-08-25 Amazon Technologies, Inc. Remote browsing session management
US9009334B1 (en) 2011-12-09 2015-04-14 Amazon Technologies, Inc. Remote browsing session management
US9330188B1 (en) 2011-12-22 2016-05-03 Amazon Technologies, Inc. Shared browsing sessions
US9978064B2 (en) 2011-12-30 2018-05-22 Visa International Service Association Hosted thin-client interface in a payment authorization system
US9609020B2 (en) * 2012-01-06 2017-03-28 Optio Labs, Inc. Systems and methods to enforce security policies on the loading, linking, and execution of native code by mobile applications running inside of virtual machines
EP2801050A4 (en) 2012-01-06 2015-06-03 Optio Labs Llc Systems and meathods for enforcing secutity in mobile computing
US9787681B2 (en) 2012-01-06 2017-10-10 Optio Labs, Inc. Systems and methods for enforcing access control policies on privileged accesses for mobile devices
US9336321B1 (en) 2012-01-26 2016-05-10 Amazon Technologies, Inc. Remote browsing and searching
US9087024B1 (en) 2012-01-26 2015-07-21 Amazon Technologies, Inc. Narration of network content
US9092405B1 (en) 2012-01-26 2015-07-28 Amazon Technologies, Inc. Remote browsing and searching
US9509783B1 (en) 2012-01-26 2016-11-29 Amazon Technlogogies, Inc. Customized browser images
US8839087B1 (en) 2012-01-26 2014-09-16 Amazon Technologies, Inc. Remote browsing and searching
US8627195B1 (en) 2012-01-26 2014-01-07 Amazon Technologies, Inc. Remote browsing and searching
US9183258B1 (en) 2012-02-10 2015-11-10 Amazon Technologies, Inc. Behavior based processing of content
US9037975B1 (en) 2012-02-10 2015-05-19 Amazon Technologies, Inc. Zooming interaction tracking and popularity determination
US9137210B1 (en) 2012-02-21 2015-09-15 Amazon Technologies, Inc. Remote browsing session management
US20130226817A1 (en) * 2012-02-23 2013-08-29 Harold W. Milton, Jr. Method for an inventor and patent agent to collaborate in preparaing a patent application
US9374244B1 (en) 2012-02-27 2016-06-21 Amazon Technologies, Inc. Remote browsing session management
US10296558B1 (en) 2012-02-27 2019-05-21 Amazon Technologies, Inc. Remote generation of composite content pages
US9208316B1 (en) 2012-02-27 2015-12-08 Amazon Technologies, Inc. Selective disabling of content portions
US9645851B1 (en) * 2012-03-14 2017-05-09 EMC IP Holding Company, LLC Automated application protection and reuse using an affinity module
US9348802B2 (en) 2012-03-19 2016-05-24 Litéra Corporation System and method for synchronizing bi-directional document management
US9027076B2 (en) * 2012-03-23 2015-05-05 Lockheed Martin Corporation Method and apparatus for context aware mobile security
US9460220B1 (en) 2012-03-26 2016-10-04 Amazon Technologies, Inc. Content selection based on target device characteristics
US9307004B1 (en) 2012-03-28 2016-04-05 Amazon Technologies, Inc. Prioritized content transmission
US8949194B1 (en) * 2012-03-30 2015-02-03 Emc Corporation Active records management
US8996505B1 (en) * 2012-03-30 2015-03-31 Pivotal Software, Inc. Data movement driven automatic data placement
RU2510982C2 (en) * 2012-04-06 2014-04-10 Закрытое акционерное общество "Лаборатория Касперского" User evaluation system and method for message filtering
US8812695B2 (en) 2012-04-09 2014-08-19 Seven Networks, Inc. Method and system for management of a virtual network connection without heartbeat messages
US9046993B2 (en) * 2012-04-10 2015-06-02 Torrential Data Solutions, Inc. System and method for content management
US8887304B2 (en) * 2012-04-11 2014-11-11 Comcast Cable Communications, Llc System and method for processing user rights
AU2013263340B2 (en) * 2012-05-16 2015-05-14 Okta, Inc. Systems and methods for providing and managing distributed enclaves
US20130332421A1 (en) * 2012-06-06 2013-12-12 International Business Machines Corporation Defining Content Retention Rules Using a Domain-Specific Language
US10084818B1 (en) 2012-06-07 2018-09-25 Amazon Technologies, Inc. Flexibly configurable data modification services
US9286491B2 (en) 2012-06-07 2016-03-15 Amazon Technologies, Inc. Virtual service provider zones
US10075471B2 (en) 2012-06-07 2018-09-11 Amazon Technologies, Inc. Data loss prevention techniques
US9053302B2 (en) 2012-06-08 2015-06-09 Oracle International Corporation Obligation system for enterprise environments
US9213805B2 (en) 2012-06-20 2015-12-15 Ricoh Company, Ltd. Approach for managing access to data on client devices
US8732792B2 (en) 2012-06-20 2014-05-20 Ricoh Company, Ltd. Approach for managing access to data on client devices
US9047463B2 (en) * 2012-06-29 2015-06-02 Sri International Method and system for protecting data flow at a mobile device
US9294508B2 (en) * 2012-08-02 2016-03-22 Cellsec Inc. Automated multi-level federation and enforcement of information management policies in a device network
US9772979B1 (en) 2012-08-08 2017-09-26 Amazon Technologies, Inc. Reproducing user browsing sessions
US8805779B2 (en) * 2012-08-14 2014-08-12 Longsand Limited Applying an action on a data item according to a classification and a data management policy
US8943197B1 (en) 2012-08-16 2015-01-27 Amazon Technologies, Inc. Automated content update notification
US10091049B2 (en) * 2012-08-17 2018-10-02 F5 Networks, Inc. Scripting for implementing policy-based traffic steering and management
US9174118B1 (en) * 2012-08-20 2015-11-03 Kabum, Inc. System and method for detecting game client modification through script injection
US9363670B2 (en) 2012-08-27 2016-06-07 Optio Labs, Inc. Systems and methods for restricting access to network resources via in-location access point protocol
EP2733909B8 (en) * 2012-08-29 2019-03-13 Huawei Device Co., Ltd. Terminal control method and device, and terminal
US9143498B2 (en) 2012-08-30 2015-09-22 Aerohive Networks, Inc. Internetwork authentication
US10456686B2 (en) 2012-09-05 2019-10-29 Zynga Inc. Methods and systems for adaptive tuning of game events
US20140074659A1 (en) 2012-09-07 2014-03-13 Oracle International Corporation Ramped ordering for cloud services
US9667470B2 (en) 2012-09-07 2017-05-30 Oracle International Corporation Failure handling in the execution flow of provisioning operations in a cloud environment
US9621435B2 (en) 2012-09-07 2017-04-11 Oracle International Corporation Declarative and extensible model for provisioning of cloud based services
US9253113B2 (en) 2012-09-07 2016-02-02 Oracle International Corporation Customizable model for throttling and prioritizing orders in a cloud environment
US9276942B2 (en) 2012-09-07 2016-03-01 Oracle International Corporation Multi-tenancy identity management system
US9542400B2 (en) 2012-09-07 2017-01-10 Oracle International Corporation Service archive support
US9069979B2 (en) 2012-09-07 2015-06-30 Oracle International Corporation LDAP-based multi-tenant in-cloud identity management system
US10521746B2 (en) 2012-09-07 2019-12-31 Oracle International Corporation Recovery workflow for processing subscription orders in a computing infrastructure system
US9467355B2 (en) 2012-09-07 2016-10-11 Oracle International Corporation Service association model
US10148530B2 (en) 2012-09-07 2018-12-04 Oracle International Corporation Rule based subscription cloning
US9219719B1 (en) * 2012-09-21 2015-12-22 Google Inc. Automatic dynamic vetting of browser extensions and web applications
US9191805B2 (en) * 2012-09-24 2015-11-17 Verizon Patent And Licensing Inc. Connecting devices to a policy charging rules function device
US20150242570A1 (en) * 2012-09-30 2015-08-27 Hewlett-Packard Development Company, Lp Electronic health record system with customizable compliance policies
US9519441B1 (en) 2012-09-30 2016-12-13 EMC IP Holding Company LLC Automated storage provisioning and management using a centralized database
US11055124B1 (en) * 2012-09-30 2021-07-06 EMC IP Holding Company LLC Centralized storage provisioning and management across multiple service providers
US9251354B2 (en) * 2012-10-15 2016-02-02 Imprivata, Inc. Secure access supersession on shared workstations
US10262267B2 (en) * 2012-10-31 2019-04-16 Huawei Technologies Co., Ltd. Method and device for processing policy
US8769633B1 (en) 2012-12-12 2014-07-01 Bruce R. Backa System and method for policy based control of NAS storage devices
US20140164052A1 (en) * 2012-12-12 2014-06-12 Hartford Fire Insurance Company System and Method for Managing and Displaying Company Policy Data
US10356204B2 (en) 2012-12-13 2019-07-16 Microsoft Technology Licensing, Llc Application based hardware identifiers
US9537892B2 (en) * 2012-12-20 2017-01-03 Bank Of America Corporation Facilitating separation-of-duties when provisioning access rights in a computing system
US9189644B2 (en) 2012-12-20 2015-11-17 Bank Of America Corporation Access requests at IAM system implementing IAM data model
US9529629B2 (en) 2012-12-20 2016-12-27 Bank Of America Corporation Computing resource inventory system
EP2750350B1 (en) * 2012-12-25 2017-03-29 AO Kaspersky Lab System and method for deploying preconfigured software
RU2541935C2 (en) 2012-12-25 2015-02-20 Закрытое акционерное общество "Лаборатория Касперского" System and method for deploying preconfigured software
US9773107B2 (en) 2013-01-07 2017-09-26 Optio Labs, Inc. Systems and methods for enforcing security in mobile computing
US8874761B2 (en) 2013-01-25 2014-10-28 Seven Networks, Inc. Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols
JP6066751B2 (en) * 2013-01-31 2017-01-25 キヤノン株式会社 Information processing system, control method therefor, and program
US9326185B2 (en) 2013-03-11 2016-04-26 Seven Networks, Llc Mobile network congestion recognition for optimization of mobile traffic
US20140258373A1 (en) * 2013-03-11 2014-09-11 Say Media, Inc. Systems and Methods for Managing and Publishing Managed Content
US9608958B2 (en) 2013-03-12 2017-03-28 Oracle International Corporation Lightweight directory access protocol (LDAP) join search mechanism
US9578445B2 (en) 2013-03-13 2017-02-21 Optio Labs, Inc. Systems and methods to synchronize data to a mobile device based on a device usage context
US20140280955A1 (en) * 2013-03-14 2014-09-18 Sky Socket, Llc Controlling Electronically Communicated Resources
US9553894B2 (en) * 2013-03-14 2017-01-24 Apcera, Inc. System and method for transparently injecting policy in a platform as a service infrastructure
US9769056B2 (en) 2013-03-15 2017-09-19 Aerohive Networks, Inc. Gateway using multicast to unicast conversion
WO2014141595A1 (en) * 2013-03-15 2014-09-18 パナソニック株式会社 Content distribution method, content distribution system, source device, and sink device
US20140283002A1 (en) * 2013-03-15 2014-09-18 Stephen Frechette Method and system for anonymous circumvention of internet filter firewalls without detection or identification
US20130218829A1 (en) * 2013-03-15 2013-08-22 Deneen Lizette Martinez Document management system and method
US9762679B2 (en) 2013-03-15 2017-09-12 Aerohive Networks, Inc. Providing stateless network services
US9942102B2 (en) * 2013-04-10 2018-04-10 Illumio, Inc. Handling changes in a distributed network management system that uses a logical multi-dimensional label-based policy model
US9882919B2 (en) 2013-04-10 2018-01-30 Illumio, Inc. Distributed network security using a logical multi-dimensional label-based policy model
US20140324192A1 (en) * 2013-04-30 2014-10-30 Verizon Patent And Licensing, Inc. User activity-based mode creation in an automation system
US9858247B2 (en) 2013-05-20 2018-01-02 Microsoft Technology Licensing, Llc Runtime resolution of content references
JP6189645B2 (en) * 2013-05-30 2017-08-30 株式会社Nttドコモ M2M platform apparatus and communication service execution method
US10152463B1 (en) 2013-06-13 2018-12-11 Amazon Technologies, Inc. System for profiling page browsing interactions
US9578137B1 (en) 2013-06-13 2017-02-21 Amazon Technologies, Inc. System for enhancing script execution performance
US10025782B2 (en) 2013-06-18 2018-07-17 Litera Corporation Systems and methods for multiple document version collaboration and management
FR3007865A1 (en) * 2013-06-26 2015-01-02 France Telecom SYSTEM AND METHOD FOR CONTROLLING ACCESS TO A SET OF RESOURCES OF A CLOUD COMPUTING SYSTEM
US20160132561A1 (en) * 2013-06-28 2016-05-12 Hewlett-Packard Development Company, L.P. Expiration tag of data
US9460451B2 (en) 2013-07-01 2016-10-04 Yahoo! Inc. Quality scoring system for advertisements and content in an online system
US9065765B2 (en) 2013-07-22 2015-06-23 Seven Networks, Inc. Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network
WO2015010218A1 (en) * 2013-07-22 2015-01-29 Kaba Ag Fail-safe distributed access control system
US9870543B2 (en) 2013-08-12 2018-01-16 GoodData Corporation Custom-branded analytic applications in a multi-tenant environment
JP6351225B2 (en) * 2013-09-02 2018-07-04 キヤノン株式会社 Image processing apparatus, information processing system, control method therefor, and program for information processing apparatus and image processing apparatus
EP3080709A4 (en) 2013-09-09 2017-07-05 Unitedlex Corp. Interactive case management system
US9213820B2 (en) * 2013-09-10 2015-12-15 Ebay Inc. Mobile authentication using a wearable device
US10445311B1 (en) 2013-09-11 2019-10-15 Sumo Logic Anomaly detection
US9231877B2 (en) * 2013-09-17 2016-01-05 Adva Optical Networking Se Method and apparatus for scaling traffic engineering routing in a network
CN105659558B (en) 2013-09-20 2018-08-31 甲骨文国际公司 Computer implemented method, authorization server and computer-readable memory
US10614421B2 (en) 2013-09-21 2020-04-07 Oracle International Corporation Method and system for in-memory policy analytics
US10176611B2 (en) * 2013-10-21 2019-01-08 Cellco Partnership Layer-based image updates
US8769610B1 (en) * 2013-10-31 2014-07-01 Eventure Interactive, Inc. Distance-modified security and content sharing
US20150188852A1 (en) * 2014-01-02 2015-07-02 Bank Of America Corporation Out-of-office (ooo) automation for an e-mail application
US9742838B2 (en) 2014-01-09 2017-08-22 Red Hat, Inc. Locked files for cartridges in a multi-tenant platform-as-a-service (PaaS) system
US9286329B2 (en) * 2014-01-31 2016-03-15 GoodData Corporation Generating analytics application using reusable application modules
US20150242531A1 (en) * 2014-02-25 2015-08-27 International Business Machines Corporation Database access control for multi-tier processing
US9160757B1 (en) * 2014-03-12 2015-10-13 Symantec Corporation Systems and methods for detecting suspicious attempts to access data based on organizational relationships
US9703611B1 (en) 2014-03-21 2017-07-11 Amazon Technologies, Inc. Isolating resources for utilization by tenants executing in multi-tenant software containers
US9646309B2 (en) 2014-04-04 2017-05-09 Mobilespaces Method for authentication and assuring compliance of devices accessing external services
US20150312188A1 (en) * 2014-04-23 2015-10-29 Actiance, Inc. Distributed policy enforcement for enterprise communications
US9773117B2 (en) 2014-06-04 2017-09-26 Microsoft Technology Licensing, Llc Dissolvable protection of candidate sensitive data items
US9521116B2 (en) 2014-06-11 2016-12-13 Verizon Patent And Licensing Inc. Apparatus, method, and system for securing a public wireless network
GB2527081B (en) * 2014-06-11 2021-05-19 Ibm Asynchronous resource usage collection and control of fenced user code
US9635041B1 (en) 2014-06-16 2017-04-25 Amazon Technologies, Inc. Distributed split browser content inspection and analysis
US10360389B2 (en) 2014-06-24 2019-07-23 Hewlett-Packard Development Company, L.P. Composite document access
US9449187B2 (en) * 2014-08-11 2016-09-20 Document Dynamics, Llc Environment-aware security tokens
US9992619B2 (en) 2014-08-12 2018-06-05 Aerohive Networks, Inc. Network device based proximity beacon locating
US10561944B2 (en) 2014-09-10 2020-02-18 Zynga Inc. Adjusting object adaptive modification or game level difficulty and physical gestures through level definition files
US9675889B2 (en) 2014-09-10 2017-06-13 Zynga Inc. Systems and methods for determining game level attributes based on player skill level prior to game play in the level
US9935978B2 (en) * 2014-09-19 2018-04-03 Microsoft Technology Licensing, Llc Policy application for multi-identity apps
US9141659B1 (en) * 2014-09-25 2015-09-22 State Farm Mutual Automobile Insurance Company Systems and methods for scrubbing confidential insurance account data
US9159069B1 (en) * 2014-10-20 2015-10-13 Bank Of America Corporation System for encoding customer data
US9396343B2 (en) * 2014-10-20 2016-07-19 International Business Machines Corporation Policy access control lists attached to resources
US9521151B2 (en) * 2014-10-22 2016-12-13 CloudHealth Technologies, Inc. Automated and policy driven optimization of cloud infrastructure through delegated actions
RU2701111C2 (en) * 2014-10-22 2019-09-24 Майкрософт Израэл Рисерч Энд Дивелопмент (2002) Лтд. Enabling classification and control of access rights to information in software applications
TWI556129B (en) * 2014-11-07 2016-11-01 財團法人工業技術研究院 Management server and method and user client device and monitoring method thereof
US10986131B1 (en) * 2014-12-17 2021-04-20 Amazon Technologies, Inc. Access control policy warnings and suggestions
US10122757B1 (en) 2014-12-17 2018-11-06 Amazon Technologies, Inc. Self-learning access control policies
US10805337B2 (en) * 2014-12-19 2020-10-13 The Boeing Company Policy-based network security
EP3040845A1 (en) * 2015-01-05 2016-07-06 Iguazio Systems Ltd. Service oriented data management and architecture
US10104042B2 (en) * 2015-01-27 2018-10-16 Red Hat, Inc. Security policy management
US9641548B2 (en) * 2015-02-03 2017-05-02 F-Secure Corporation System and method for detecting and protecting against malicious
US10043030B1 (en) 2015-02-05 2018-08-07 Amazon Technologies, Inc. Large-scale authorization data collection and aggregation
US10242062B2 (en) 2015-02-20 2019-03-26 Threatstop, Inc. Normalization and extraction of log data
US11176267B2 (en) 2015-02-24 2021-11-16 International Business Machines Corporation Fine-grained user control over usages of sensitive system resources having private data with applications in privacy enforcement
US10198560B2 (en) * 2015-03-13 2019-02-05 Citrix Systems, Inc. Enforcing licensing policies using an application wrapper
IL237986A0 (en) * 2015-03-26 2015-11-30 Yaron Peretz Method and system for broadcasting browsing sessions
US10445289B1 (en) * 2015-03-31 2019-10-15 EMC IP Holding Company LLC Method and apparatus for automatic cleanup of disfavored content
US20160292445A1 (en) * 2015-03-31 2016-10-06 Secude Ag Context-based data classification
KR102269035B1 (en) * 2015-04-21 2021-06-24 삼성전자주식회사 Server and method for controlling a group action
US10462091B1 (en) * 2015-06-12 2019-10-29 Symantec Corporation Systems and methods for reporting the attempted transmission of sensitive information
US10866994B2 (en) * 2015-06-23 2020-12-15 Splunk Inc. Systems and methods for instant crawling, curation of data sources, and enabling ad-hoc search
US11042591B2 (en) 2015-06-23 2021-06-22 Splunk Inc. Analytical search engine
US10289819B2 (en) * 2015-08-12 2019-05-14 Kryptowire LLC Active authentication of users
US10387669B1 (en) * 2015-09-17 2019-08-20 Nextlabs, Inc. Protecting documents with centralized and discretionary policies
US20170083491A1 (en) * 2015-09-18 2017-03-23 International Business Machines Corporation Emoji semantic verification and recovery
US10148673B1 (en) * 2015-09-30 2018-12-04 EMC IP Holding Company LLC Automatic selection of malicious activity detection rules using crowd-sourcing techniques
US10592683B1 (en) * 2015-10-12 2020-03-17 Nextlabs, Inc. Applying an authorization policy across multiple application programs with requests submitted through an HTTP-based API
US10303892B1 (en) 2015-10-12 2019-05-28 Nextlabs, Inc. Viewing protected documents in a web browser
US10192050B2 (en) * 2015-10-30 2019-01-29 General Electric Company Methods, systems, apparatus, and storage media for use in detecting anomalous behavior and/or in preventing data loss
KR101656357B1 (en) * 2015-11-04 2016-09-09 국방과학연구소 Method for generating database using look up table
CA3004511A1 (en) * 2015-11-12 2017-05-18 Diversey, Inc. Predictive maintanence
US20170140391A1 (en) * 2015-11-12 2017-05-18 International Business Machines Corporation Detection of internal frauds
US10459993B2 (en) 2015-12-09 2019-10-29 Siemens Product Lifecycle Management Software Inc. Guided progressive search system and method
US9729552B2 (en) * 2015-12-15 2017-08-08 Bank Of America Corporation Access violation mitigation system
US9832184B2 (en) 2015-12-15 2017-11-28 Bank Of America Corporation Controls and administration of privileged accounts system
US10007498B2 (en) 2015-12-17 2018-06-26 Architecture Technology Corporation Application randomization mechanism
US10412116B1 (en) 2015-12-17 2019-09-10 Architecture Technology Corporation Mechanism for concealing application and operation system identity
US10284592B1 (en) * 2015-12-17 2019-05-07 Architecture Technology Corporation Application randomization mechanism
US10412114B1 (en) * 2015-12-17 2019-09-10 Architecture Technology Corporation Application randomization mechanism
US10200406B1 (en) 2015-12-17 2019-02-05 Architecture Technology Corporation Configuration of application randomization mechanism
US10200401B1 (en) * 2015-12-17 2019-02-05 Architecture Technology Corporation Evaluating results of multiple virtual machines that use application randomization mechanism
US10210545B2 (en) * 2015-12-30 2019-02-19 TCL Research America Inc. Method and system for grouping devices in a same space for cross-device marketing
US11030390B2 (en) * 2016-01-11 2021-06-08 Microsoft Technology Licensing, Llc Sharing content between electronic documents
US10270801B2 (en) * 2016-01-25 2019-04-23 Oath Inc. Compromised password detection based on abuse and attempted abuse
US11537723B2 (en) * 2016-01-29 2022-12-27 British Telecommunications Public Limited Company Secure data storage
US10498772B2 (en) * 2016-03-21 2019-12-03 Vireshwar K. Adhar Method and system for digital privacy management
US10594731B2 (en) * 2016-03-24 2020-03-17 Snowflake Inc. Systems, methods, and devices for securely managing network connections
US10212169B2 (en) * 2016-03-30 2019-02-19 Oracle International Corporation Enforcing data security in a cleanroom data processing environment
US20170285895A1 (en) * 2016-03-31 2017-10-05 Microsoft Technology Licensing, Llc Communicating editing context between users to initiate collaborative editing of electronic documents
US10158733B2 (en) * 2016-04-01 2018-12-18 App Annie Inc. Automated DPI process
CN105893050B (en) * 2016-04-05 2020-04-28 延锋伟世通电子科技(南京)有限公司 Method for carrying out full-life-cycle management on software project based on PLMS, SVN and Jenkins
US10608971B2 (en) 2016-04-14 2020-03-31 Secure Privilege, Llc Technology for managing electronic communications having certain designations
US20170315934A1 (en) * 2016-04-29 2017-11-02 Netapp, Inc. Method and System for Faster Policy Based File Access for Storage Hosted by a Network Storage System
US10733238B2 (en) * 2016-05-06 2020-08-04 Amazon Technologies, Inc. Script manager for distributed systems
US10855725B2 (en) * 2016-06-02 2020-12-01 Microsoft Technology Licensing, Llc Hardware-based virtualized security isolation
US10762099B2 (en) * 2016-06-07 2020-09-01 International Business Machines Corporation Syntactical transformation of database interaction statements
US10241847B2 (en) 2016-07-19 2019-03-26 2236008 Ontario Inc. Anomaly detection using sequences of system calls
US10152315B1 (en) * 2016-07-27 2018-12-11 Intuit Inc. Live rule deployment with deployment log
US10650621B1 (en) 2016-09-13 2020-05-12 Iocurrents, Inc. Interfacing with a vehicular controller area network
US10110635B1 (en) * 2016-09-28 2018-10-23 Amazon Technologies, Inc. Device policy composition and management system
US10778722B2 (en) * 2016-11-08 2020-09-15 Massachusetts Institute Of Technology Dynamic flow system
US10620970B2 (en) * 2016-12-19 2020-04-14 Sap Se Request processing by a runtime agent in a network system
US10705889B2 (en) 2016-12-27 2020-07-07 Dropbox, Inc. Kernel event triggers
WO2018124672A1 (en) 2016-12-28 2018-07-05 Samsung Electronics Co., Ltd. Apparatus for detecting anomaly and operating method for the same
US10542088B2 (en) 2017-01-18 2020-01-21 Microsoft Technology Licensing, Llc Modifying data resources within party-partitioned storage areas
US10536465B2 (en) * 2017-01-18 2020-01-14 Microsoft Technology Licensing, Llc Security for accessing stored resources
US10838819B2 (en) 2017-01-18 2020-11-17 Microsoft Technology Licensing, Llc Including personal relationship metadata within duplicated resources shared across partitioned storage
US10911323B2 (en) * 2017-01-24 2021-02-02 Texas Instruments Incorporated System-on-chip (SoC) assembly, configurable IP generation and IP integration utilizing distributed computer systems
US10380075B2 (en) 2017-02-14 2019-08-13 Microsoft Technology Licensing, Llc Limiting sharing of a stored file
FR3062936B1 (en) * 2017-02-15 2021-01-01 Wallix PROCESS FOR SEARCHING FOR INFORMATION IN AN ENTIRE CORPUS STORED ON A SERVER
US10333918B2 (en) * 2017-02-22 2019-06-25 Accenture Global Solutions Limited Automated system identification, authentication, and provisioning
CN107070631B (en) * 2017-02-23 2023-09-08 深圳市冠旭电子股份有限公司 Design method of multi-scroll chaotic attractor circuit
US20180255099A1 (en) * 2017-03-02 2018-09-06 Microsoft Technology Licensing, Llc Security and compliance alerts based on content, activities, and metadata in cloud
JP6575547B2 (en) * 2017-03-17 2019-09-18 富士ゼロックス株式会社 Document management system
JP6572926B2 (en) * 2017-03-17 2019-09-11 富士ゼロックス株式会社 Document management system
JP2017168129A (en) * 2017-05-12 2017-09-21 ヒューレット パッカード エンタープライズ デベロップメント エル ピーHewlett Packard Enterprise Development LP Electronic health record system with customizable compliance policies
CN107169365A (en) * 2017-05-16 2017-09-15 成都牵牛草信息技术有限公司 The establishing method of the form fields operating right of workflow and its approval node
US10554685B1 (en) * 2017-05-25 2020-02-04 Architecture Technology Corporation Self-healing architecture for resilient computing services
US10673890B2 (en) 2017-05-30 2020-06-02 Akamai Technologies, Inc. Systems and methods for automatically selecting an access control entity to mitigate attack traffic
US10453077B2 (en) * 2017-06-07 2019-10-22 Avaya, Inc. Context-based assignment of customer service agents associated with document viewing sections
US11810185B2 (en) * 2017-07-12 2023-11-07 Visa International Service Association Systems and methods for generating behavior profiles for new entities
US11681568B1 (en) 2017-08-02 2023-06-20 Styra, Inc. Method and apparatus to reduce the window for policy violations with minimal consistency assumptions
US11496517B1 (en) 2017-08-02 2022-11-08 Styra, Inc. Local API authorization method and apparatus
US10726095B1 (en) 2017-09-26 2020-07-28 Amazon Technologies, Inc. Network content layout using an intermediary system
US10664538B1 (en) 2017-09-26 2020-05-26 Amazon Technologies, Inc. Data security and data access auditing for network accessible content
US10595320B2 (en) * 2017-10-06 2020-03-17 Cisco Technology, Inc. Delegating policy through manufacturer usage descriptions
US11574287B2 (en) 2017-10-10 2023-02-07 Text IQ, Inc. Automatic document classification
US10331623B2 (en) * 2017-10-16 2019-06-25 Dropbox, Inc. Workflow functions of content management system enforced by client device
US10652189B2 (en) * 2017-10-19 2020-05-12 Chicago Mercantile Exchange Inc. Message encoding and transmission across multiple platforms
US11741300B2 (en) 2017-11-03 2023-08-29 Dropbox, Inc. Embedded spreadsheet data implementation and synchronization
CN107977417A (en) * 2017-11-22 2018-05-01 江苏翼企云通信科技有限公司 A kind of ultralight amount framework method accessed towards big data content high frequency
CN108228289A (en) * 2017-11-30 2018-06-29 维沃移动通信有限公司 A kind of interface display method and device
US10866963B2 (en) 2017-12-28 2020-12-15 Dropbox, Inc. File system authentication
US11023551B2 (en) * 2018-02-23 2021-06-01 Accenture Global Solutions Limited Document processing based on proxy logs
US10728187B2 (en) 2018-04-05 2020-07-28 Global Relay Communications Inc. System and method for processing messages with organization and personal interaction controls
US10931674B2 (en) * 2018-04-30 2021-02-23 Paypal, Inc. Detecting whether to implement one or more security measures on a shared resource
US10867044B2 (en) 2018-05-30 2020-12-15 AppOmni, Inc. Automatic computer system change monitoring and security gap detection system
US11303627B2 (en) 2018-05-31 2022-04-12 Oracle International Corporation Single Sign-On enabled OAuth token
US10922423B1 (en) * 2018-06-21 2021-02-16 Amazon Technologies, Inc. Request context generator for security policy validation service
US10719373B1 (en) 2018-08-23 2020-07-21 Styra, Inc. Validating policies and data in API authorization system
US11853463B1 (en) 2018-08-23 2023-12-26 Styra, Inc. Leveraging standard protocols to interface unmodified applications and services
US11080410B1 (en) 2018-08-24 2021-08-03 Styra, Inc. Partial policy evaluation
CA3111849A1 (en) * 2018-09-11 2020-03-19 Mastercard Technologies Canada ULC Optimized execution of fraud detection rules
US11470121B1 (en) 2018-10-16 2022-10-11 Styra, Inc. Deducing policies for authorizing an API
US11200053B2 (en) 2018-11-09 2021-12-14 Affirm, Inc. Deployment models
US11558182B2 (en) * 2018-11-15 2023-01-17 James Mark Fudala Method and system to facilitate assessment, authorization, and monitoring of policy documents related to an organization
JP7150585B2 (en) * 2018-12-06 2022-10-11 エヌ・ティ・ティ・コミュニケーションズ株式会社 Data retrieval device, its data retrieval method and program, edge server and its program
JP7150584B2 (en) 2018-12-06 2022-10-11 エヌ・ティ・ティ・コミュニケーションズ株式会社 Edge server and its program
US11263588B2 (en) * 2018-12-20 2022-03-01 Microsoft Technology Licensing, Llc Intelligent document management in computing systems
US11093642B2 (en) * 2019-01-03 2021-08-17 International Business Machines Corporation Push down policy enforcement
US11363030B2 (en) * 2019-01-08 2022-06-14 Servicenow, Inc. Systems and methods for categorized hierarchical view and modification of user accessibility to information technology item
US11042699B1 (en) 2019-01-29 2021-06-22 Massachusetts Mutual Life Insurance Company Systems, devices, and methods for software coding
US11695777B2 (en) * 2019-02-26 2023-07-04 Vmware, Inc. Hybrid access control model in computer systems
US11132692B2 (en) * 2019-03-08 2021-09-28 International Business Machines Corporation Shared voting for accounting
US11070522B1 (en) 2019-03-18 2021-07-20 Juniper Networks, Inc. Removing anomalies from security policies of a network security device
US11593525B1 (en) 2019-05-10 2023-02-28 Styra, Inc. Portable policy execution using embedded machines
US11210107B2 (en) * 2019-05-17 2021-12-28 Open Text Sa Ulc Systems and methods of multi-stage configuration service for policy-driven transformation
US11416455B2 (en) * 2019-05-29 2022-08-16 The Boeing Company Version control of electronic files defining a model of a system or component of a system
US11263334B2 (en) 2019-06-18 2022-03-01 Adp, Llc Method and system for natively accessing enterprise data according to an identified view context
US11237783B2 (en) * 2019-06-25 2022-02-01 Kyocera Document Solutions, Inc. Methods for personal and business policy-based printing system
US11206284B2 (en) 2019-08-02 2021-12-21 EMC IP Holding Company LLC Automated threat analysis of a system design
GB201913348D0 (en) * 2019-09-16 2019-10-30 Palantir Technologies Inc Data deletion system and method
US11328089B2 (en) * 2019-09-20 2022-05-10 International Business Machines Corporation Built-in legal framework file management
US11106813B2 (en) * 2019-09-20 2021-08-31 International Business Machines Corporation Credentials for consent based file access
US11443056B2 (en) 2019-09-20 2022-09-13 International Business Machines Corporation File access restrictions enforcement
US11327665B2 (en) 2019-09-20 2022-05-10 International Business Machines Corporation Managing data on volumes
US11652848B1 (en) * 2019-09-26 2023-05-16 Amazon Technologies, Inc. Distributed evaluation of networking security rules
US11489805B2 (en) * 2019-10-01 2022-11-01 Dell Products L.P. Automated email legal hold
US11611549B2 (en) * 2019-10-03 2023-03-21 Fset Inc System and method of securing access to a secure remote server and database on a mobile device
JP7358897B2 (en) * 2019-10-09 2023-10-11 富士フイルムビジネスイノベーション株式会社 Information processing device and information processing program
US11362997B2 (en) 2019-10-16 2022-06-14 International Business Machines Corporation Real-time policy rule evaluation with multistage processing
US11455294B2 (en) * 2019-10-18 2022-09-27 Sap Se Information lifecycle management notification framework
CN112765106A (en) * 2019-10-21 2021-05-07 伊姆西Ip控股有限责任公司 File access method, electronic device and computer program product
US11157525B2 (en) * 2019-12-05 2021-10-26 Murray B. WILSHINSKY Method and system for self-aggregation of personal data and control thereof
US11218360B2 (en) 2019-12-09 2022-01-04 Quest Automated Services, LLC Automation system with edge computing
US11323482B2 (en) * 2019-12-31 2022-05-03 Mcafee, Llc Methods, systems, and media for protecting computer systems from user-created objects
US11734441B2 (en) * 2019-12-31 2023-08-22 Digital Guardian Llc Systems and methods for tracing data across file-related operations
US11582235B1 (en) 2020-01-27 2023-02-14 Styra, Inc. Local controller for local API authorization method and apparatus
US11272326B2 (en) * 2020-01-30 2022-03-08 Slack Technologies, Llc Methods, apparatuses and computer program products for implementing communication barriers in a group-based communication system
US11934351B2 (en) * 2020-01-31 2024-03-19 Salesforce, Inc. Lossless conversion of expressive metadata
WO2021157031A1 (en) * 2020-02-06 2021-08-12 三菱電機株式会社 Setting change device, setting change method, and setting change program
US11442701B2 (en) * 2020-02-25 2022-09-13 EMC IP Holding Company LLC Filtering security controls
US20210272035A1 (en) * 2020-02-28 2021-09-02 Uber Technologies, Inc. Storage location selection according to query evaluation
US11494518B1 (en) 2020-03-02 2022-11-08 Styra, Inc. Method and apparatus for specifying policies for authorizing APIs
US11775405B2 (en) * 2020-03-20 2023-10-03 UncommonX Inc. Generation of an issue response evaluation regarding a system aspect of a system
US11709659B1 (en) * 2020-03-25 2023-07-25 Stripe, Inc. Systems and methods for a code generation tool for software development systems
EP3896590A1 (en) * 2020-04-17 2021-10-20 Siemens Aktiengesellschaft Method and systems for transferring software artefacts from a source network to a destination network
US11558396B2 (en) * 2020-05-29 2023-01-17 Mastercard International Incorporated Computer-implemented methods, systems comprising computer-readable media, and electronic devices for team-sourced anomaly vetting via automatically-delegated role definition
US11579847B2 (en) * 2020-06-10 2023-02-14 Snap Inc. Software development kit engagement monitor
US11709953B2 (en) * 2020-06-19 2023-07-25 Acronis International Gmbh Systems and methods for executing data protection policies specific to a classified organizational structure
US11561932B2 (en) 2020-07-21 2023-01-24 International Business Machines Corporation Cognitive digital file naming
US11513778B1 (en) 2020-08-14 2022-11-29 Styra, Inc. Graphical user interface and system for defining and maintaining code-based policies
US11593363B1 (en) 2020-09-23 2023-02-28 Styra, Inc. Comprehension indexing feature
JP2022066084A (en) * 2020-10-16 2022-04-28 キヤノン株式会社 Information processing apparatus
US11200132B1 (en) * 2020-10-29 2021-12-14 EMC IP Holding Company LLC Anomaly aware log retrieval from disk array enclosures (DAEs)
US11593762B2 (en) 2020-10-30 2023-02-28 Docusign, Inc. Automated collaborative document progress interface in an online document system
US11379424B2 (en) * 2020-10-30 2022-07-05 Docusign, Inc. Edit interface in an online document system
US11520579B1 (en) 2020-11-30 2022-12-06 Styra, Inc. Automated asymptotic analysis
US11893130B2 (en) 2020-12-18 2024-02-06 Paypal, Inc. Data lifecycle discovery and management
US20220198054A1 (en) * 2020-12-18 2022-06-23 Paypal, Inc. Rights management regarding user data associated with data lifecycle discovery platform
US20220200960A1 (en) * 2020-12-21 2022-06-23 Oracle International Corporation Automatic web application firewall (waf) security suggester
US11755445B2 (en) * 2021-02-17 2023-09-12 Microsoft Technology Licensing, Llc Distributed virtual data tank for cross service quota management
US11922413B2 (en) 2021-03-05 2024-03-05 Capital One Services, Llc Managing pre-provisioning and post-provisioning of resources using bitemporal analysis
US11409864B1 (en) 2021-06-07 2022-08-09 Snowflake Inc. Tracing supervisor for UDFs in a database system
US11348071B1 (en) * 2021-07-22 2022-05-31 Dell Products L.P. Role-based access control enabled corporate email
US20230105093A1 (en) * 2021-10-01 2023-04-06 CorVel Corporation Systems and methods for claim processing
US11822699B1 (en) 2021-10-21 2023-11-21 Secure Computing, Llc Preventing surreptitious access to file data by malware
CN114077933B (en) * 2022-01-13 2022-04-15 常州艾肯智造科技有限公司 Real-time transmission system and method for steam on-line monitoring data
US20230388313A1 (en) * 2022-05-31 2023-11-30 Acronis International Gmbh Automatic User Group Manager
US20230394007A1 (en) * 2022-06-01 2023-12-07 Microsoft Technology Licensing, Llc Automated metadata management for unstructured data storage

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS6421625A (en) * 1987-07-17 1989-01-25 Nec Corp Information management system
US6463470B1 (en) * 1998-10-26 2002-10-08 Cisco Technology, Inc. Method and apparatus of storing policies for policy-based management of quality of service treatments of network data traffic flows
WO2004040464A2 (en) * 2002-10-30 2004-05-13 Vidius Inc. A method and system for managing confidential information
US6915435B1 (en) * 2000-02-09 2005-07-05 Sun Microsystems, Inc. Method and system for managing information retention

Family Cites Families (215)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4531023A (en) * 1982-08-13 1985-07-23 Hlf Corporation Computer security system for a time shared computer accessed over telephone lines
US5050213A (en) * 1986-10-14 1991-09-17 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
IL100987A (en) 1991-02-27 1995-10-31 Digital Equipment Corp Method and apparatus for compiling code
US5742760A (en) * 1992-05-12 1998-04-21 Compaq Computer Corporation Network packet switch using shared memory for repeating and bridging packets at media rate
US5548761A (en) 1993-03-09 1996-08-20 International Business Machines Corporation Compiler for target machine independent optimization of data movement, ownership transfer and device control
US5564016A (en) * 1993-12-17 1996-10-08 International Business Machines Corporation Method for controlling access to a computer resource based on a timing policy
US5440686A (en) * 1993-12-22 1995-08-08 International Business Machines Corporation Selecting a data unit candidate to be demoted to a backing store from a front store based upon thresholds individual to each of the data candidates
US5537620A (en) * 1994-09-16 1996-07-16 International Business Machines Corporation Redundant load elimination on optimizing compilers
US5638443A (en) 1994-11-23 1997-06-10 Xerox Corporation System for controlling the distribution and use of composite digital works
US5715403A (en) * 1994-11-23 1998-02-03 Xerox Corporation System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
JPH08263438A (en) 1994-11-23 1996-10-11 Xerox Corp Distribution and use control system of digital work and access control method to digital work
US5629980A (en) * 1994-11-23 1997-05-13 Xerox Corporation System for controlling the distribution and use of digital works
US5634012A (en) 1994-11-23 1997-05-27 Xerox Corporation System for controlling the distribution and use of digital works having a fee reporting mechanism
DE69637733D1 (en) 1995-02-13 2008-12-11 Intertrust Tech Corp SYSTEMS AND METHOD FOR SAFE TRANSMISSION
US5848396A (en) 1996-04-26 1998-12-08 Freedom Of Information, Inc. Method and apparatus for determining behavioral profile of a computer user
JP3334499B2 (en) 1996-07-02 2002-10-15 ティアック株式会社 Recording medium playback device
US6446092B1 (en) * 1996-11-01 2002-09-03 Peerdirect Company Independent distributed database system
US7062500B1 (en) 1997-02-25 2006-06-13 Intertrust Technologies Corp. Techniques for defining, using and manipulating rights management data structures
US7272625B1 (en) * 1997-03-10 2007-09-18 Sonicwall, Inc. Generalized policy server
US7821926B2 (en) * 1997-03-10 2010-10-26 Sonicwall, Inc. Generalized policy server
US6373935B1 (en) 1997-06-30 2002-04-16 Sprint Communications Company L.P. Workstation for calling card fraud analysis
US6009525A (en) 1997-08-29 1999-12-28 Preview Systems, Inc. Multi-tier electronic software distribution
US6014666A (en) * 1997-10-28 2000-01-11 Microsoft Corporation Declarative and programmatic access control of component-based server applications using roles
US7076784B1 (en) 1997-10-28 2006-07-11 Microsoft Corporation Software component execution management using context objects for tracking externally-defined intrinsic properties of executing software components within an execution environment
US7092914B1 (en) * 1997-11-06 2006-08-15 Intertrust Technologies Corporation Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US6202066B1 (en) * 1997-11-19 2001-03-13 The United States Of America As Represented By The Secretary Of Commerce Implementation of role/group permission association using object access type
US6035423A (en) * 1997-12-31 2000-03-07 Network Associates, Inc. Method and system for providing automated updating and upgrading of antivirus applications using a computer network
US6782506B1 (en) * 1998-02-12 2004-08-24 Newriver, Inc. Obtaining consent for electronic delivery of compliance information
US6357010B1 (en) * 1998-02-17 2002-03-12 Secure Computing Corporation System and method for controlling access to documents stored on an internal network
US6480844B1 (en) 1998-03-25 2002-11-12 At&T Corp. Method for inferring behavioral characteristics based on a large volume of data
US6735701B1 (en) * 1998-06-25 2004-05-11 Macarthur Investments, Llc Network policy management and effectiveness system
US6182142B1 (en) * 1998-07-10 2001-01-30 Encommerce, Inc. Distributed access management of information resources
US6466932B1 (en) * 1998-08-14 2002-10-15 Microsoft Corporation System and method for implementing group policy
US6412070B1 (en) * 1998-09-21 2002-06-25 Microsoft Corporation Extensible security system and method for controlling access to objects in a computing environment
JP2002526830A (en) * 1998-09-28 2002-08-20 アーガス システムズ グループ,インク. Compartmentalized trust computer operating system
US6460141B1 (en) * 1998-10-28 2002-10-01 Rsa Security Inc. Security and access management system for web-enabled and non-web-enabled applications and content on a computer network
US7673323B1 (en) * 1998-10-28 2010-03-02 Bea Systems, Inc. System and method for maintaining security in a distributed computer network
US6574736B1 (en) 1998-11-30 2003-06-03 Microsoft Corporation Composable roles
US6510466B1 (en) * 1998-12-14 2003-01-21 International Business Machines Corporation Methods, systems and computer program products for centralized management of application programs on a network
US6336117B1 (en) * 1999-04-30 2002-01-01 International Business Machines Corporation Content-indexing search system and method providing search results consistent with content filtering and blocking policies implemented in a blocking engine
US6289450B1 (en) * 1999-05-28 2001-09-11 Authentica, Inc. Information security architecture for encrypting documents for remote access while maintaining access control
US6708187B1 (en) * 1999-06-10 2004-03-16 Alcatel Method for selective LDAP database synchronization
US6910135B1 (en) * 1999-07-07 2005-06-21 Verizon Corporate Services Group Inc. Method and apparatus for an intruder detection reporting and response system
US6704873B1 (en) * 1999-07-30 2004-03-09 Accenture Llp Secure gateway interconnection in an e-commerce based environment
US20040230559A1 (en) * 1999-08-09 2004-11-18 Mark Newman Information processing device and information processing method
AUPQ278799A0 (en) * 1999-09-13 1999-10-07 Telstra R & D Management Pty Ltd An access control method
US6789202B1 (en) * 1999-10-15 2004-09-07 Networks Associates Technology, Inc. Method and apparatus for providing a policy-driven intrusion detection system
US6430561B1 (en) * 1999-10-29 2002-08-06 International Business Machines Corporation Security policy for protection of files on a storage device
JP3546787B2 (en) 1999-12-16 2004-07-28 インターナショナル・ビジネス・マシーンズ・コーポレーション Access control system, access control method, and storage medium
US6701342B1 (en) * 1999-12-21 2004-03-02 Agilent Technologies, Inc. Method and apparatus for processing quality of service measurement data to assess a degree of compliance of internet services with service level agreements
US20020100031A1 (en) * 2000-01-14 2002-07-25 Miguel Miranda System and method for optimizing source code
US7536336B1 (en) * 2000-05-19 2009-05-19 Paypal, Inc. Multi-party electronic transactions
US6961762B1 (en) 2000-02-14 2005-11-01 Sygate Technologies, Inc. Automatic switching network points based on configuration profiles
US20020062245A1 (en) * 2000-03-09 2002-05-23 David Niu System and method for generating real-time promotions on an electronic commerce world wide website to increase the likelihood of purchase
US6751659B1 (en) 2000-03-31 2004-06-15 Intel Corporation Distributing policy information in a communication network
US6990513B2 (en) * 2000-06-22 2006-01-24 Microsoft Corporation Distributed computing services platform
AU2001276848A1 (en) * 2000-06-30 2002-01-14 E L And Associates, Inc. Method and apparatus for encrypted electronic file access control
US6665867B1 (en) 2000-07-06 2003-12-16 International Business Machines Corporation Self-propagating software objects and applications
US7185192B1 (en) * 2000-07-07 2007-02-27 Emc Corporation Methods and apparatus for controlling access to a resource
US7350204B2 (en) * 2000-07-24 2008-03-25 Microsoft Corporation Policies for secure software execution
CA2424713C (en) * 2000-08-21 2007-12-04 Thoughtslinger Corporation Simultaneous multi-user document editing system
US7089295B2 (en) 2000-09-06 2006-08-08 Oracle International Corporation Customizing content provided by a service
US6954751B2 (en) 2000-09-06 2005-10-11 Oracle International Corporation Accessing data stored at an intermediary from a service
US20020138617A1 (en) 2000-09-06 2002-09-26 Jacob Christfort Providing content from multiple services
US6941355B1 (en) 2000-09-08 2005-09-06 Bbnt Solutions Llc System for selecting and disseminating active policies to peer device and discarding policy that is not being requested
US20020046350A1 (en) * 2000-09-14 2002-04-18 Lordemann David A. Method and system for establishing an audit trail to protect objects distributed over a network
US7065556B1 (en) 2000-09-14 2006-06-20 Hewlett-Packard Development Company, L.P. Method and system for logging event data and persistently downloading the same
EP1340167A2 (en) * 2000-11-28 2003-09-03 4thPass Inc. Method and system for maintaining and distributing wireless applications
US7146635B2 (en) * 2000-12-27 2006-12-05 International Business Machines Corporation Apparatus and method for using a directory service for authentication and authorization to access resources outside of the directory service
US7013332B2 (en) * 2001-01-09 2006-03-14 Microsoft Corporation Distributed policy model for access control
JP3859450B2 (en) * 2001-02-07 2006-12-20 富士通株式会社 Secret information management system and information terminal
US7010698B2 (en) * 2001-02-14 2006-03-07 Invicta Networks, Inc. Systems and methods for creating a code inspection system
US7330717B2 (en) 2001-02-23 2008-02-12 Lucent Technologies Inc. Rule-based system and method for managing the provisioning of user applications on limited-resource and/or wireless devices
US20020129216A1 (en) * 2001-03-06 2002-09-12 Kevin Collins Apparatus and method for configuring available storage capacity on a network as a logical device
US7054866B2 (en) * 2001-03-20 2006-05-30 Mci, Inc. Systems and methods for communicating from an integration platform to a provisioning server
US7043480B2 (en) * 2001-03-20 2006-05-09 Mci, Inc. Systems and methods for communicating from an integration platform to a lightweight directory access protocol based database
JP2002287990A (en) * 2001-03-26 2002-10-04 Canon Inc Application managing device, application managing method, recording medium, and program
US7140010B2 (en) * 2001-03-30 2006-11-21 Sun Microsystems, Inc. Method and apparatus for simultaneous optimization of code targeting multiple machines
US6766314B2 (en) * 2001-04-05 2004-07-20 International Business Machines Corporation Method for attachment and recognition of external authorization policy on file system resources
US7028305B2 (en) * 2001-05-16 2006-04-11 Softricity, Inc. Operating system abstraction and protection layer
US7581170B2 (en) * 2001-05-31 2009-08-25 Lixto Software Gmbh Visual and interactive wrapper generation, automated information extraction from Web pages, and translation into XML
US7603317B2 (en) 2001-06-19 2009-10-13 International Business Machines Corporation Using a privacy agreement framework to improve handling of personally identifiable information
US7069427B2 (en) * 2001-06-19 2006-06-27 International Business Machines Corporation Using a rules model to improve handling of personally identifiable information
US7962962B2 (en) 2001-06-19 2011-06-14 International Business Machines Corporation Using an object model to improve handling of personally identifiable information
US7590684B2 (en) * 2001-07-06 2009-09-15 Check Point Software Technologies, Inc. System providing methodology for access control with cooperative enforcement
US7159125B2 (en) * 2001-08-14 2007-01-02 Endforce, Inc. Policy engine for modular generation of policy for a flat, per-device database
SE527177C2 (en) * 2001-09-25 2006-01-17 Sandvik Intellectual Property Use of an austenitic stainless steel
US7069581B2 (en) 2001-10-04 2006-06-27 Mcafee, Inc. Method and apparatus to facilitate cross-domain push deployment of software in an enterprise environment
US7478418B2 (en) 2001-12-12 2009-01-13 Guardian Data Storage, Llc Guaranteed delivery of changes to security policies in a distributed system
US7350226B2 (en) * 2001-12-13 2008-03-25 Bea Systems, Inc. System and method for analyzing security policies in a distributed computer network
US7054944B2 (en) * 2001-12-19 2006-05-30 Intel Corporation Access control management system utilizing network and application layer access control lists
KR20040075359A (en) * 2002-01-17 2004-08-27 코닌클리케 필립스 일렉트로닉스 엔.브이. Secure data input dialogue using visual cryptography
US8176334B2 (en) * 2002-09-30 2012-05-08 Guardian Data Storage, Llc Document security system that permits external users to gain access to secured files
EP1483717A4 (en) * 2002-03-14 2006-05-24 Contentguard Holdings Inc Rights expression profile system and method using templates and profiles
US7031787B2 (en) * 2002-03-21 2006-04-18 Sap Aktiengesellschaft Change management
AUPS129702A0 (en) * 2002-03-25 2002-05-02 Panareef Pty Ltd Electronic document classification and monitoring
US8205259B2 (en) * 2002-03-29 2012-06-19 Global Dataguard Inc. Adaptive behavioral intrusion detection systems and methods
CA2381737A1 (en) 2002-04-15 2003-10-15 Ibm Canada Limited-Ibm Canada Limitee Framework for managing data that provides correlation information in a distributed computing system
US20050071657A1 (en) * 2003-09-30 2005-03-31 Pss Systems, Inc. Method and system for securing digital assets using time-based security criteria
US7383570B2 (en) * 2002-04-25 2008-06-03 Intertrust Technologies, Corp. Secure authentication systems and methods
US20030204438A1 (en) 2002-04-29 2003-10-30 The Boeing Company Method for acquisition and distribution of behavioral data for content performance evaluation
US8099325B2 (en) * 2002-05-01 2012-01-17 Saytam Computer Services Limited System and method for selective transmission of multimedia based on subscriber behavioral model
US6950825B2 (en) * 2002-05-30 2005-09-27 International Business Machines Corporation Fine grained role-based access to system resources
JP2004021557A (en) * 2002-06-14 2004-01-22 Hitachi Ltd Program, information processing method, information processor, and storage device
US7020667B2 (en) 2002-07-18 2006-03-28 International Business Machines Corporation System and method for data retrieval and collection in a structured format
US20040024767A1 (en) 2002-07-31 2004-02-05 Dexing Chen Method and system for managing event information in a computer network
GB2391373A (en) 2002-07-31 2004-02-04 David Toms A system for the automatic detection of a fraudulent transaction
US7058630B2 (en) * 2002-08-12 2006-06-06 International Business Machines Corporation System and method for dynamically controlling access to a database
US7237236B2 (en) * 2002-08-22 2007-06-26 International Business Machines Corporation Method and apparatus for automatically determining optimum placement of privileged code locations in existing code
US7437752B2 (en) * 2002-09-23 2008-10-14 Credant Technologies, Inc. Client architecture for portable device with security policies
US20040078434A1 (en) 2002-10-17 2004-04-22 Lockheed Martin Corporation Method, system and program product for automated document export control
US20040078603A1 (en) * 2002-10-18 2004-04-22 Eiji Ogura System and method of protecting data
JP2006516339A (en) * 2002-12-02 2006-06-29 エレメンタル セキュリティー System and method for providing an enterprise-based computer security policy
US7367060B2 (en) * 2002-12-11 2008-04-29 Ravi Someshwar Methods and apparatus for secure document printing
US20040117490A1 (en) * 2002-12-13 2004-06-17 General Instrument Corporation Method and system for providing chaining of rules in a digital rights management system
US7594111B2 (en) * 2002-12-19 2009-09-22 Massachusetts Institute Of Technology Secure execution of a computer program
US7644361B2 (en) * 2002-12-23 2010-01-05 Canon Kabushiki Kaisha Method of using recommendations to visually create new views of data across heterogeneous sources
US8141159B2 (en) * 2002-12-31 2012-03-20 Portauthority Technologies Inc. Method and system for protecting confidential information
US20040143661A1 (en) * 2003-01-14 2004-07-22 Akio Higashi Content history log collecting system
US20050102515A1 (en) * 2003-02-03 2005-05-12 Dave Jaworski Controlling read and write operations for digital media
US9197668B2 (en) * 2003-02-28 2015-11-24 Novell, Inc. Access control to files based on source information
US7529754B2 (en) * 2003-03-14 2009-05-05 Websense, Inc. System and method of monitoring and controlling application files
US7403925B2 (en) * 2003-03-17 2008-07-22 Intel Corporation Entitlement security and control
US7213014B2 (en) * 2003-03-27 2007-05-01 International Business Machines Corporation Apparatus and method for using a predefined database operation as a data source for a different database operation
US7543284B2 (en) * 2003-04-22 2009-06-02 Transitive Limited Partial dead code elimination optimizations for program code conversion
US7200841B2 (en) 2003-04-22 2007-04-03 Transitive Limited Method and apparatus for performing lazy byteswapping optimizations during program code conversion
US20040226009A1 (en) * 2003-05-09 2004-11-11 International Business Machines Corporation System and method for software application task abstraction
US7783019B2 (en) 2003-05-15 2010-08-24 Verizon Business Global Llc Method and apparatus for providing fraud detection using geographically differentiated connection duration thresholds
US7817791B2 (en) 2003-05-15 2010-10-19 Verizon Business Global Llc Method and apparatus for providing fraud detection using hot or cold originating attributes
US7971237B2 (en) * 2003-05-15 2011-06-28 Verizon Business Global Llc Method and system for providing fraud detection for remote access services
JP4759513B2 (en) * 2003-06-02 2011-08-31 リキッド・マシンズ・インコーポレーテッド Data object management in dynamic, distributed and collaborative environments
US20040254988A1 (en) * 2003-06-12 2004-12-16 Rodriguez Rafael A. Method of and universal apparatus and module for automatically managing electronic communications, such as e-mail and the like, to enable integrity assurance thereof and real-time compliance with pre-established regulatory requirements as promulgated in government and other compliance database files and information websites, and the like
EP1507402A3 (en) * 2003-06-23 2005-07-20 Ricoh Company, Ltd. Access control decision system, access control enforcing system, and security policy
CA2433750A1 (en) 2003-06-27 2004-12-27 Ibm Canada Limited - Ibm Canada Limitee Automatic collection of trace detail and history data
US7496890B2 (en) * 2003-06-30 2009-02-24 Microsoft Corporation Generation of configuration instructions using an abstraction technique
US7774386B2 (en) * 2003-07-24 2010-08-10 International Business Machines Corporation Applying abstraction to object markup definitions
US20050027583A1 (en) 2003-07-30 2005-02-03 Smit Colin Julian Programmable automated trustee (PAT) system, capable of advanced oversight applications, through the tracking, monitoring and analyzing of the investment process workflow activities, identifying anomalies and trends and reporting such anomalies and trends to the user
US7350237B2 (en) * 2003-08-18 2008-03-25 Sap Ag Managing access control information
US7434048B1 (en) * 2003-09-09 2008-10-07 Adobe Systems Incorporated Controlling access to electronic documents
US7415719B2 (en) 2003-09-26 2008-08-19 Tizor Systems, Inc. Policy specification framework for insider intrusions
US7673147B2 (en) * 2003-09-26 2010-03-02 Tizor Systems, Inc. Real-time mitigation of data access insider intrusions
US8880893B2 (en) 2003-09-26 2014-11-04 Ibm International Group B.V. Enterprise information asset protection through insider attack specification, monitoring and mitigation
US8127366B2 (en) * 2003-09-30 2012-02-28 Guardian Data Storage, Llc Method and apparatus for transitioning between states of security policies used to secure electronic documents
US7703140B2 (en) * 2003-09-30 2010-04-20 Guardian Data Storage, Llc Method and system for securing digital assets using process-driven security policies
US7644432B2 (en) * 2003-10-10 2010-01-05 Bea Systems, Inc. Policy inheritance through nested groups
US9064364B2 (en) 2003-10-22 2015-06-23 International Business Machines Corporation Confidential fraud detection system and method
US7930757B2 (en) * 2003-10-31 2011-04-19 Adobe Systems Incorporated Offline access in a document control system
US7565702B2 (en) * 2003-11-03 2009-07-21 Microsoft Corporation Password-based key management
US7581249B2 (en) * 2003-11-14 2009-08-25 Enterasys Networks, Inc. Distributed intrusion response system
US20050114672A1 (en) * 2003-11-20 2005-05-26 Encryptx Corporation Data rights management of digital information in a portable software permission wrapper
JP2005165847A (en) * 2003-12-04 2005-06-23 Fujitsu Ltd Policy rule scenario control device and control method
US7082429B2 (en) * 2003-12-10 2006-07-25 National Chiao Tung University Method for web content filtering
US20050138642A1 (en) 2003-12-18 2005-06-23 International Business Machines Corporation Event correlation system and method for monitoring resources
US8010456B2 (en) 2003-12-22 2011-08-30 International Business Machines Corporation Policy based application provisioning in a collaborative computing environment
WO2005064498A1 (en) * 2003-12-23 2005-07-14 Trust Digital, Llc System and method for enforcing a security policy on mobile devices using dynamically generated security profiles
US20050149940A1 (en) * 2003-12-31 2005-07-07 Sychron Inc. System Providing Methodology for Policy-Based Resource Allocation
US8627458B2 (en) * 2004-01-13 2014-01-07 Mcafee, Inc. Detecting malicious computer program activity using external program calls with dynamic rule sets
JP4265413B2 (en) * 2004-01-19 2009-05-20 日本電気株式会社 Policy enforcement system and method for virtual private organization
US7716135B2 (en) 2004-01-29 2010-05-11 International Business Machines Corporation Incremental compliance environment, an enterprise-wide system for detecting fraud
US7685206B1 (en) * 2004-02-12 2010-03-23 Microsoft Corporation Authorization and access control service for distributed network resources
JP4625334B2 (en) * 2004-02-13 2011-02-02 株式会社リコー Information processing apparatus, information processing method, information processing program, recording medium, and resource management apparatus
US20050183143A1 (en) * 2004-02-13 2005-08-18 Anderholm Eric J. Methods and systems for monitoring user, application or device activity
US7418699B2 (en) 2004-02-20 2008-08-26 Intel Corporation Method and system for performing link-time code optimization without additional code analysis
US7142848B2 (en) 2004-02-26 2006-11-28 Research In Motion Limited Method and system for automatically configuring access control
US7818780B1 (en) * 2004-04-01 2010-10-19 Cisco Technology, Inc. Method and compiler for routing policy
US20050222928A1 (en) 2004-04-06 2005-10-06 Pricewaterhousecoopers Llp Systems and methods for investigation of financial reporting information
US20050222929A1 (en) * 2004-04-06 2005-10-06 Pricewaterhousecoopers Llp Systems and methods for investigation of financial reporting information
JP4606052B2 (en) * 2004-04-08 2011-01-05 株式会社リコー Information processing apparatus, operation permission information generation method, operation permission information generation program, and recording medium
US7720264B2 (en) 2004-05-10 2010-05-18 Avago Technologies General Ip (Singapore) Pte. Ltd. Method and system for pupil detection for security applications
EP1745587A1 (en) * 2004-05-12 2007-01-24 Telefonaktiebolaget LM Ericsson (publ) Key management messages for secure broadcast
US8180742B2 (en) * 2004-07-01 2012-05-15 Emc Corporation Policy-based information management
US7739303B2 (en) * 2004-07-22 2010-06-15 International Business Machines Corporation Method, system and program product for verifying access to a data object
US7228307B2 (en) * 2004-07-29 2007-06-05 International Business Machines Corporation Security model using security domains in a security model applied to abstract database
JP4728610B2 (en) * 2004-08-04 2011-07-20 株式会社リコー Access control list attachment system, original content creator terminal, policy server, original content data management server, program, and recording medium
US7373516B2 (en) * 2004-08-19 2008-05-13 International Business Machines Corporation Systems and methods of securing resources through passwords
US20060048142A1 (en) * 2004-09-02 2006-03-02 Roese John J System and method for rapid response network policy implementation
US20060080432A1 (en) * 2004-09-03 2006-04-13 Spataro Jared M Systems and methods for collaboration
WO2006036991A2 (en) * 2004-09-24 2006-04-06 Encomia, L.P. A method and system for building audit rule sets for electronic auditing of documents
US7711835B2 (en) * 2004-09-30 2010-05-04 Citrix Systems, Inc. Method and apparatus for reducing disclosure of proprietary data in a networked environment
US7454778B2 (en) * 2004-09-30 2008-11-18 Microsoft Corporation Enforcing rights management through edge email servers
US7506364B2 (en) * 2004-10-01 2009-03-17 Microsoft Corporation Integrated access authorization
US7904956B2 (en) * 2004-10-01 2011-03-08 Microsoft Corporation Access authorization with anomaly detection
US20060072595A1 (en) * 2004-10-05 2006-04-06 Cisco Technology, Inc. System and method for service tagging for enhanced packet processing in a network environment
US20060080316A1 (en) * 2004-10-08 2006-04-13 Meridio Ltd Multiple indexing of an electronic document to selectively permit access to the content and metadata thereof
US20060097036A1 (en) * 2004-11-05 2006-05-11 First Data Corporation Account management systems and methods
US20060097035A1 (en) * 2004-11-09 2006-05-11 Motorola, Inc. Size effective keypad switching and backlighting scheme
US7188346B2 (en) 2004-11-29 2007-03-06 International Business Machines Corporation Method, system and program product for correlating data between operating environments
US20070226204A1 (en) * 2004-12-23 2007-09-27 David Feldman Content-based user interface for document management
US8561126B2 (en) * 2004-12-29 2013-10-15 International Business Machines Corporation Automatic enforcement of obligations according to a data-handling policy
US20060143179A1 (en) * 2004-12-29 2006-06-29 Motorola, Inc. Apparatus and method for managing security policy information using a device management tree
US7950010B2 (en) 2005-01-21 2011-05-24 Sap Ag Software deployment system
US7512618B2 (en) * 2005-01-24 2009-03-31 International Business Machines Corporation Automatic inspection tool
US7681226B2 (en) * 2005-01-28 2010-03-16 Cisco Technology, Inc. Methods and apparatus providing security for multiple operational states of a computerized device
JP4170299B2 (en) * 2005-01-31 2008-10-22 独立行政法人 宇宙航空研究開発機構 Communication state transition monitoring method and communication state transition monitoring apparatus using the same
JP2006279930A (en) * 2005-03-01 2006-10-12 Nec Corp Method and device for detecting and blocking unauthorized access
WO2006095335A2 (en) * 2005-03-07 2006-09-14 Noam Camiel System and method for a dynamic policies enforced file system for a data storage device
JP2006285601A (en) 2005-03-31 2006-10-19 Fujitsu Ltd File distribution method, and client terminal realizing it
US8676945B2 (en) * 2005-04-14 2014-03-18 Verizon Business Global Llc Method and system for processing fault alarms and maintenance events in a managed network services system
US7463637B2 (en) * 2005-04-14 2008-12-09 Alcatel Lucent Public and private network service management systems and methods
JP4791760B2 (en) * 2005-05-17 2011-10-12 株式会社リコー Access control apparatus, access control method, and access control program
US20060277594A1 (en) * 2005-06-02 2006-12-07 International Business Machines Corporation Policy implementation delegation
US7793333B2 (en) * 2005-06-13 2010-09-07 International Business Machines Corporation Mobile authorization using policy based access control
US20070006278A1 (en) * 2005-06-29 2007-01-04 Ioan Avram Mircea S Automated dissemination of enterprise policy for runtime customization of resource arbitration
US20070028291A1 (en) * 2005-07-29 2007-02-01 Bit 9, Inc. Parametric content control in a network security system
US7814330B2 (en) * 2005-08-01 2010-10-12 Oracle International Corporation Method and apparatus for facilitating multi-level computer system authentication
US8056114B2 (en) * 2005-08-23 2011-11-08 The Boeing Company Implementing access control policies across dissimilar access control platforms
AU2006304655B2 (en) * 2005-10-18 2012-08-16 Intertrust Technologies Corporation Methods for digital rights management
US7627893B2 (en) * 2005-10-20 2009-12-01 International Business Machines Corporation Method and system for dynamic adjustment of computer security based on network activity of users
JP4854000B2 (en) * 2005-11-02 2012-01-11 株式会社日立ソリューションズ Confidential file protection method
US8095960B2 (en) * 2005-11-21 2012-01-10 Novell, Inc. Secure synchronization and sharing of secrets
US8141125B2 (en) * 2005-11-30 2012-03-20 Oracle International Corporation Orchestration of policy engines and format technologies
US9286469B2 (en) * 2005-12-16 2016-03-15 Cisco Technology, Inc. Methods and apparatus providing computer and network security utilizing probabilistic signature generation
US8621549B2 (en) * 2005-12-29 2013-12-31 Nextlabs, Inc. Enforcing control policies in an information management system
US20070199044A1 (en) * 2006-02-17 2007-08-23 Samsung Electronics Co., Ltd. Systems and methods for distributed security policy management
US7606732B2 (en) * 2006-03-16 2009-10-20 Us Beverage Net Inc. Distributed meter networks and systems for monitoring same

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS6421625A (en) * 1987-07-17 1989-01-25 Nec Corp Information management system
US6463470B1 (en) * 1998-10-26 2002-10-08 Cisco Technology, Inc. Method and apparatus of storing policies for policy-based management of quality of service treatments of network data traffic flows
US6915435B1 (en) * 2000-02-09 2005-07-05 Sun Microsystems, Inc. Method and system for managing information retention
WO2004040464A2 (en) * 2002-10-30 2004-05-13 Vidius Inc. A method and system for managing confidential information

Also Published As

Publication number Publication date
US9081981B2 (en) 2015-07-14
US20070156727A1 (en) 2007-07-05
US9946717B2 (en) 2018-04-17
US8875218B2 (en) 2014-10-28
US20160308914A1 (en) 2016-10-20
US20150052577A1 (en) 2015-02-19
US8661003B2 (en) 2014-02-25
US8972449B2 (en) 2015-03-03
US20070157288A1 (en) 2007-07-05
US8156566B2 (en) 2012-04-10
US20150019762A1 (en) 2015-01-15
US20070156696A1 (en) 2007-07-05
US20170142125A1 (en) 2017-05-18
US9311503B2 (en) 2016-04-12
US9740703B2 (en) 2017-08-22
US9864752B2 (en) 2018-01-09
US20160224798A1 (en) 2016-08-04
US8849858B2 (en) 2014-09-30
US20070156694A1 (en) 2007-07-05
US20150178295A1 (en) 2015-06-25
US8150816B2 (en) 2012-04-03
US20070156695A1 (en) 2007-07-05
US9384363B2 (en) 2016-07-05
US8640191B2 (en) 2014-01-28
US20070169168A1 (en) 2007-07-19
US20120198516A1 (en) 2012-08-02
US10223366B2 (en) 2019-03-05
US8862551B2 (en) 2014-10-14
US20150033288A1 (en) 2015-01-29
US20070157287A1 (en) 2007-07-05
US9396351B2 (en) 2016-07-19
WO2007120360A2 (en) 2007-10-25
US20160315971A1 (en) 2016-10-27
US20160328574A1 (en) 2016-11-10
US20070156670A1 (en) 2007-07-05
US9384360B2 (en) 2016-07-05
US20120191677A1 (en) 2012-07-26
US9558193B2 (en) 2017-01-31
US20070179987A1 (en) 2007-08-02

Similar Documents

Publication Publication Date Title
WO2007120360A3 (en) Information management system
TW200705929A (en) Method and system for implementing authorization policies for web services
AU2003243521A1 (en) Systems and methods for dynamic policy management
WO2008051792A3 (en) Data file access control
WO2006093840A3 (en) System and method for networked media access
WO2007074431A3 (en) Method and apparatus for securing access to applications
WO2006115595A3 (en) System, method and computer program product for applying electronic policies
WO2007075389A3 (en) Customer relationship management system and method
WO2007064374A3 (en) Customer relationship management system and method
WO2006026659A3 (en) Services oriented architecture for data integration services
WO2006089277A3 (en) A multi-layer system for privacy enforcement and monitoring of suspicious data access behavior
WO2007044865A3 (en) Information nervous system
WO2006031921A3 (en) System and method for managing data in a distributed computer system
WO2006124910A3 (en) System and method for automated management of an address database
EP1982540A4 (en) Content-based policy compliance systems and methods
EP1673890A4 (en) Identity-based-encryption system with district policy information
EP1872282A4 (en) Systems and methods for providing distributed, decentralized data storage and retrieval
WO2008080143A3 (en) Method and system for searching stored data
WO2006118716A3 (en) Network access protection
WO2005086738A3 (en) Data structure with market capitalization breakdown
EP1716497A4 (en) Systems and methods for vertically integrated data distribution and access management
WO2007146707A3 (en) Rfid enterprise server improvements
WO2002061612A3 (en) Data structure for information systems
EP1956498A4 (en) Document data managing method, managing system, and computer software
WO2009042911A3 (en) Search based data management

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06851049

Country of ref document: EP

Kind code of ref document: A2