Resources Contact Us Home
Browse by Category: Main > Information Technology
Class Information
Number: 726/1
Name: Information security > Policy
Description: Subject matter comprising systems, methods, and apparatus that provide for the administration and management of rules or regulations governing the protection of information, services and other data processing resources involving coordination of more than one security mechanisms among a plurality of entities, resources, or processes.

Patents under this class:

Patent Number Title Of Patent Date Issued
8646026 Smart web services security policy selection and validation Feb. 4, 2014
8646025 Automated local exception rule generation system, method and computer program product Feb. 4, 2014
8645679 System and method for merging security constraints when using security annotations Feb. 4, 2014
8645422 Method for controlling access to informational objects Feb. 4, 2014
8644461 Unified rules for voice and messaging Feb. 4, 2014
8643876 User and device localization using probabilistic device log trilateration Feb. 4, 2014
8643475 Radio frequency identification secret handshakes Feb. 4, 2014
8640226 Mechanisms to secure data on hard reset of device Jan. 28, 2014
8640219 Digital rights management (DRM) enabled portable playback device, method and system Jan. 28, 2014
8640216 Systems and methods for cross site forgery protection Jan. 28, 2014
8640207 System and method for monitoring usage of a user device Jan. 28, 2014
8640191 Inspecting code and reducing code size associated to a target Jan. 28, 2014
8640190 Parental control policy generation Jan. 28, 2014
8640189 Communicating results of validation services Jan. 28, 2014
8640188 Methods, systems, and computer readable media for providing group policy configuration in a communications network using a fake user Jan. 28, 2014
8640187 Systems and methods for providing an fully functional isolated execution environment for accessing content Jan. 28, 2014
8640186 Pre-authorization of bearer set-up Jan. 28, 2014
8640185 Personal-information managing apparatus and personal-information handling apparatus Jan. 28, 2014
8639926 Techniques for mobile device authentication Jan. 28, 2014
8638939 User authentication on an electronic device Jan. 28, 2014
8635706 System and method for data mining and security policy management Jan. 21, 2014
8635700 Detecting malware using stored patterns Jan. 21, 2014
8635689 Hybrid role mining Jan. 21, 2014
8635673 Dynamic application adaptation in software-as-a-service platform Jan. 21, 2014
8635663 Restriction of program process capabilities Jan. 21, 2014
8635662 Dynamic trust model for authenticating a user Jan. 21, 2014
8635661 System and method for enforcing a security policy on mobile devices using dynamically generated security profiles Jan. 21, 2014
8635660 Dynamic constraints for query operations Jan. 21, 2014
8634549 Ciphertext key chaining Jan. 21, 2014
8631468 Active access monitoring for safer computing environments and systems Jan. 14, 2014
8631466 Machine to-machine (M2M) call flow security Jan. 14, 2014
8631462 Trusted network management method of trusted network connections based on tri-element peer authentication Jan. 14, 2014
8631461 Dynamic data-protection policies within a request-reply message queuing environment Jan. 14, 2014
8631460 Systems and methods for implementing transparent encryption Jan. 14, 2014
8631459 Policy and compliance management for user provisioning systems Jan. 14, 2014
8631458 Method and apparatus for elastic (re)allocation of enterprise workloads on clouds while minimizing compliance costs Jan. 14, 2014
8631457 Method and apparatus for monitoring text-based communications to secure a computer Jan. 14, 2014
8631227 Processing encrypted electronic documents Jan. 14, 2014
8627490 Enforcing document control in an information management system Jan. 7, 2014
8627462 Token processing Jan. 7, 2014
8627439 Processing communication events in a communications system Jan. 7, 2014
8627410 Dynamic radius Jan. 7, 2014
8627405 Policy and compliance management for user provisioning systems Jan. 7, 2014
8627404 Detecting addition of a file to a computer system and initiating remote analysis of the file for malware Jan. 7, 2014
8627403 Policy applicability determination Jan. 7, 2014
8627402 Evaluation systems and methods for coordinating software agents Jan. 7, 2014
8626861 Method of detecting compromised computers in a network Jan. 7, 2014
8626669 Secure physical billing system Jan. 7, 2014
8626125 Apparatus and method for securing mobile terminal Jan. 7, 2014
8625799 Privacy management for tracked devices Jan. 7, 2014

  Recently Added Patents
Disk array apparatus and firmware update method therefor
Micro vein enhancer
Vehicle grille
Method for production of a thermoelectric apparatus
Method for forming contact in an integrated circuit
Method and system for placing an emergency call
Qualification screening system and screening method thereof, qualification screening device and device under qualification screening
  Randomly Featured Patents
Urinary drainage container comprising external source of biocide
Arylbis (perfluoroalkylsulfonyl)methane and metallic salt thereof, and methods for producing the same
High-frequency amplifier
Electrolytic cell and a method for manufacturing the same
Method for making a dual-thickness gate oxide layer using a nitride/oxide composite region
Multi-node data processing system and communication protocol in which a stomp signal is propagated to cancel a prior request
Color transfer photographic processes and products with indole phthalein filter dyes
Electronic component and method of manufacture
Methods and apparatus for changing the color of illumination of a cooking chamber of a microwave oven
Method and apparatus for hardware forwarding of LAN frames over ATM networks