Resources Contact Us Home
Browse by: INVENTOR PATENT HOLDER PATENT NUMBER DATE
 
 
Browse by Category: Main > Information Technology
Class Information
Number: 726/1
Name: Information security > Policy
Description: Subject matter comprising systems, methods, and apparatus that provide for the administration and management of rules or regulations governing the protection of information, services and other data processing resources involving coordination of more than one security mechanisms among a plurality of entities, resources, or processes.










Patents under this class:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next

Patent Number Title Of Patent Date Issued
8359277 Directory infrastructure for social networking web application services Jan. 22, 2013
8356341 Life cycle management of authentication rules for service provisioning Jan. 15, 2013
8356332 Extensible protocol validation Jan. 15, 2013
8353044 Methods and systems for computing device remediation Jan. 8, 2013
8353033 Collecting malware samples via unauthorized download protection Jan. 8, 2013
8353020 Transparently extensible firewall cluster Jan. 8, 2013
8353018 Automatic local listing owner authentication system Jan. 8, 2013
8353017 User password protection Jan. 8, 2013
8353014 Dynamic dual permissions-based data capturing and logging Jan. 8, 2013
8353005 Unified management policy Jan. 8, 2013
8353002 Chaining information card selectors Jan. 8, 2013
8353001 Methods and apparatus for rating device security and automatically assessing security compliance Jan. 8, 2013
8353000 System and charging control method of network convergence policy and charging control architecture Jan. 8, 2013
8352999 Method for managing data in a shared computing environment Jan. 8, 2013
8352998 Policy evaluation in controlled environment Jan. 8, 2013
8352731 Secure decentralized storage system Jan. 8, 2013
8347403 Single point authentication for web service policy definition Jan. 1, 2013
8347380 Protecting users from accidentally disclosing personal information in an insecure environment Jan. 1, 2013
8347351 Systems and methods of controlling network access Jan. 1, 2013
8347350 Systems and methods of controlling network access Jan. 1, 2013
8347349 Configuring browser policy settings on client computing devices Jan. 1, 2013
8347348 Apparatus, system, and method for pre-boot policy modification Jan. 1, 2013
8347347 Password policy enforcement in a distributed directory when policy information is distributed Jan. 1, 2013
8347346 Management of mandatory access control for graphical user interface applications Jan. 1, 2013
8347323 Method and apparatus for supporting development of broker program, and computer product Jan. 1, 2013
8346952 De-centralization of group administration authority within a network storage architecture Jan. 1, 2013
8341753 Managing pre-release of a game application over a network Dec. 25, 2012
8341737 Detecting fraudulent web sites through an obfuscated reporting mechanism Dec. 25, 2012
8341733 Creating secured file views in a software partition Dec. 25, 2012
8341723 Filtering kernel-mode network communications Dec. 25, 2012
8341717 Dynamic network policies based on device classification Dec. 25, 2012
8341695 Method of access control implemented in an Ethernet switch Dec. 25, 2012
8341694 Method and system for synchronized access control in a web services environment Dec. 25, 2012
8341693 Enterprise-wide security system for computer devices Dec. 25, 2012
8341692 Modifying digital rights Dec. 25, 2012
8341691 Policy based selection of remediation Dec. 25, 2012
8341415 Phrase matching Dec. 25, 2012
8341389 Device, systems, and method for securely starting up a computer installation Dec. 25, 2012
8340638 System and method of maintaining communications policy settings in a wireless network Dec. 25, 2012
8336110 Authentication of content download Dec. 18, 2012
8336103 Data structure for policy-based remediation selection Dec. 18, 2012
8336099 Methods, hardware products, and computer program products for implementing introspection data comparison utilizing hypervisor guest introspection data Dec. 18, 2012
8336081 Trusted network connect system for enhancing the security Dec. 18, 2012
8336080 Methods and apparatus for rating device security and automatically assessing security compliance Dec. 18, 2012
8336079 Intelligent security control system for virtualized ecosystems Dec. 18, 2012
8336078 Role-based access in a multi-customer computing environment Dec. 18, 2012
8332939 System and method for the automatic identification of subject-executed code and subject-granted access rights Dec. 11, 2012
8332918 Techniques for real-time adaptive password policies Dec. 11, 2012
8332909 Automated software restriction policy rule generation Dec. 11, 2012
8332908 Sharing management system, sharing management method and program Dec. 11, 2012

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next










 
 
  Recently Added Patents
Image processing device, printing apparatus, image processing method, and method of producing printing apparatus
Fluid handling structure, a lithographic apparatus and a device manufacturing method
Water bottle warning triangle
Human activity monitoring device
Asymmetric switching rectifier
Performance monitoring of advanced process control systems
Electric motor
  Randomly Featured Patents
Apparatus for PTP pocket formation
Technology for fabrication of packaging interface substrate wafers with fully metallized vias through the substrate wafer
Pear tree
Support structure of circuit module
Anthurium plant named `Happy Love`
High-throughput data processing system equipped with cache memory system for achieving high hit ratio
Photographing lens driving control apparatus
Color picture camera including an amplifier circuit for whiteness and brightness compensation
Electrical junction block for automobile and a method for manufacturing the same
Adjustment gasification device for gas lighters