Resources Contact Us Home
Browse by: INVENTOR PATENT HOLDER PATENT NUMBER DATE
 
 
Browse by Category: Main > Information Technology
Class Information
Number: 726/1
Name: Information security > Policy
Description: Subject matter comprising systems, methods, and apparatus that provide for the administration and management of rules or regulations governing the protection of information, services and other data processing resources involving coordination of more than one security mechanisms among a plurality of entities, resources, or processes.










Patents under this class:

Patent Number Title Of Patent Date Issued
8713684 Quantifying the risks of applications for mobile devices Apr. 29, 2014
8713682 Dynamic learning method and adaptive normal behavior profile (NBP) architecture for providing fast protection of enterprise applications Apr. 29, 2014
8713631 System and method for detecting malicious code executed by virtual machine Apr. 29, 2014
8713630 Verifiable service policy implementation for intermediate networking devices Apr. 29, 2014
8713629 Method for accessing wireless network Apr. 29, 2014
8713628 Method and system for providing cloud based network security services Apr. 29, 2014
8713627 Scalable security services for multicast in a router having integrated zone-based firewall Apr. 29, 2014
8713626 Network client validation of network management frames Apr. 29, 2014
8713173 System and method for ensuring compliance with organizational policies Apr. 29, 2014
8707451 Search hit URL modification for secure application integration Apr. 22, 2014
8707416 Bootstrapping kerberos from EAP (BKE) Apr. 22, 2014
8707390 System and method for secure access control in a wireless network Apr. 22, 2014
8707388 System, method and computer program product for an authentication management infrastructure Apr. 22, 2014
8707387 Secure network computing Apr. 22, 2014
8707386 Policy processing system, method, and program Apr. 22, 2014
8707385 Automated compliance policy enforcement in software systems Apr. 22, 2014
8707384 Change recommendations for compliance policy enforcement Apr. 22, 2014
8707383 Computer workload management with security policy enforcement Apr. 22, 2014
8707303 Dynamic virtualization and policy-based access control of removable storage devices in a virtualized environment Apr. 22, 2014
8707180 System for cyber investigation and data management Apr. 22, 2014
8706801 Rendering a web page using content communicated to a browser application from a process running on a client Apr. 22, 2014
8695068 Device authentication using display device irregularity Apr. 8, 2014
8695060 System and method for creating secure applications Apr. 8, 2014
8695059 Method and system for providing network security services in a multi-tenancy format Apr. 8, 2014
8695058 Selective management of mobile device data in an enterprise environment Apr. 8, 2014
8695057 Communications apparatus and control method therefor Apr. 8, 2014
8695056 Method for information tracking in multiple interdependent dimensions Apr. 8, 2014
8694622 Monitoring and controlling network communications Apr. 8, 2014
8693687 Method and apparatus of processing three-dimensional video content Apr. 8, 2014
8689351 Playing control files for personal video recorders Apr. 1, 2014
8689334 Security protection for a customer programmable platform Apr. 1, 2014
8689316 Routing a packet by a device Apr. 1, 2014
8689302 System, method and program for user authentication, and recording medium on which the program is recorded Apr. 1, 2014
8689289 Global object access auditing Apr. 1, 2014
8689287 Federated credentialing system and method Apr. 1, 2014
8689286 System and method for determining a security encoding to be applied to outgoing messages Apr. 1, 2014
8689285 Rule-based derived-group security data management Apr. 1, 2014
8689284 Method of customizing a standardized IT policy Apr. 1, 2014
8689283 Security access control method and system for wired local area network Apr. 1, 2014
8689282 Security policy enforcement framework for cloud-based information processing systems Apr. 1, 2014
8689281 Management of context-aware policies Apr. 1, 2014
8689280 DNS-based content routing Apr. 1, 2014
8689279 Encrypted chunk-based rapid data encryption policy compliance Apr. 1, 2014
8689278 Web service provision system, server device, and method Apr. 1, 2014
8689277 Method and system for providing location of target device using stateless user information Apr. 1, 2014
8689276 System and method for controlling access to files Apr. 1, 2014
8683607 Method of web service and its apparatus Mar. 25, 2014
8683602 System and method for multilevel secure object management Mar. 25, 2014
8683571 System and method for authentication of users in a secure computer system Mar. 25, 2014
8683568 Using packet interception to integrate risk-based user authentication into online services Mar. 25, 2014











 
 
  Recently Added Patents
Simulation parameter correction technique
Electronic device
Method and apparatus for eliminating a motor vehicle tip-over risk
Email certificates
Integrated circuit packaging system with an integral-interposer-structure and method of manufacture thereof
Peer-to-peer, internet protocol telephone system with proxy interface for configuration data
(4928
  Randomly Featured Patents
Stress reduction for flip chip package
Contact sensor package
Spraying device
Shoes
Blade holder
Process for making a massage device departing from an electric toothbrush
High polymer solids slurry polymerization employing 1-olefin comonomer
Employing unused configuration memory cells as scratchpad memory
Storage system for restoring data stored in failed storage device
Transmission line driver circuit