Resources Contact Us Home
Browse by Category: Main > Information Technology
Class Information
Number: 726/1
Name: Information security > Policy
Description: Subject matter comprising systems, methods, and apparatus that provide for the administration and management of rules or regulations governing the protection of information, services and other data processing resources involving coordination of more than one security mechanisms among a plurality of entities, resources, or processes.

Patents under this class:

Patent Number Title Of Patent Date Issued
8661498 Secure and scalable detection of preselected data embedded in electronically transmitted messages Feb. 25, 2014
8661158 Smart tunneling to resources in a network Feb. 25, 2014
8656507 Apparatus, system and computer readable medium for transmitting electronic information in response to a determination that changed access right information satifies a stored condition Feb. 18, 2014
8656492 Systems, methods, and apparatus for network intrusion detection Feb. 18, 2014
8656490 Safe and secure access to dynamic domain name systems Feb. 18, 2014
8656469 Methods and apparatus for dynamic user authentication using customizable context-dependent interaction across multiple verification objects Feb. 18, 2014
8656457 Controlling locking state transitions in a terminal Feb. 18, 2014
8656456 Privacy preferences management system Feb. 18, 2014
8656455 Managing data loss prevention policies Feb. 18, 2014
8656454 Data store including a file location attribute Feb. 18, 2014
8656453 Security systems and/or methods for cloud computing environments Feb. 18, 2014
8656452 Data assurance Feb. 18, 2014
8656451 Policy application server for mobile data networks Feb. 18, 2014
8656450 Security policy switching device, security policy management system, and storage medium Feb. 18, 2014
8656449 Applying policy attributes to events Feb. 18, 2014
8656448 Providing policy-based application services to an application running on a computing system Feb. 18, 2014
8656154 Cloud based service logout using cryptographic challenge response Feb. 18, 2014
8656016 Managing application execution and data access on a device Feb. 18, 2014
8655960 Location-aware instant messaging Feb. 18, 2014
8654763 Systematic approach towards minimizing packet classifiers Feb. 18, 2014
8650648 Method and system for detecting restricted content associated with retrieved content Feb. 11, 2014
8650647 Web site computer security using client hygiene scores Feb. 11, 2014
8650638 System and method for detecting a file embedded in an arbitrary location and determining the reputation of the file Feb. 11, 2014
8650617 Method and system for real-time insertion of services during a call session over a communication network Feb. 11, 2014
8650616 User definable policy for graduated authentication based on the partial orderings of principals Feb. 11, 2014
8650612 Security context lockdown Feb. 11, 2014
8650611 Image forming apparatus and method of setting security policy thereof Feb. 11, 2014
8650610 Systems and methods of controlling network access Feb. 11, 2014
8650609 Image processing apparatus and method of controlling the same Feb. 11, 2014
8650608 Method for model based verification of security policies for web service composition Feb. 11, 2014
8650395 Selective shredding in a deduplication system Feb. 11, 2014
8650288 Runtime usage analysis for a distributed policy enforcement system Feb. 11, 2014
8650287 Local reputation to adjust sensitivity of behavioral detection system Feb. 11, 2014
8650256 Communications security by enforcing offline consumption and auto-termination of electronic messages Feb. 11, 2014
8649520 Method and system for establishing real-time trust in a public network Feb. 11, 2014
RE44746 System and method for handling data transfers Feb. 4, 2014
8646102 Method and apparatus for issuing rights in a digital rights management system Feb. 4, 2014
8646095 Personal site privacy policy Feb. 4, 2014
8646073 Detection of account hijacking in a social network Feb. 4, 2014
8646066 Security protocol control apparatus and security protocol control method Feb. 4, 2014
8646057 Authentication and authorization of user and access to network resources using openid Feb. 4, 2014
8646055 Method and system for pre-shared-key-based network security access control Feb. 4, 2014
8646045 Bank speech authentication Feb. 4, 2014
8646044 Mandatory integrity control Feb. 4, 2014
8646032 Method and apparatus providing privacy setting and monitoring user interface Feb. 4, 2014
8646031 Method of generating security rule-set and system thereof Feb. 4, 2014
8646030 Method and apparatus for master privacy policy mechanism in a communications network Feb. 4, 2014
8646029 Security model for a layout engine and scripting engine Feb. 4, 2014
8646028 Methods and systems for allocating a USB device to a trusted virtual machine or a non-trusted virtual machine Feb. 4, 2014
8646027 Workflow based authorization for content access Feb. 4, 2014

  Recently Added Patents
Case for electronic device
Protocol delay measuring device and protocol delay measuring method
Scalable architecture for rank order filtering
Digital camera dock having movable guide pins
Vehicle detection apparatus and method using magnetic sensor
Holding structure for a touch panel
Gateway channel utilization
  Randomly Featured Patents
Molybdenum-doped indium oxide structures and methods
Hydraulically-actuated fuel injector with variable rate return spring
Semiconductor memory device having improved manner of data line connection in hierarchical data line structure
Lever-operated shears
Centralized performance monitoring architecture
Strand guide
Method and system for business planning via a communications network
Iodonium salts
Torque converter with a rotary oscillation damper