EP0520709A3
(en)
*
|
1991-06-28 |
1994-08-24 |
Digital Equipment Corp |
A method for providing a security facility for remote systems management
|
US5577209A
(en)
*
|
1991-07-11 |
1996-11-19 |
Itt Corporation |
Apparatus and method for providing multi-level security for communication among computers and terminals on a network
|
US5301316A
(en)
*
|
1991-10-30 |
1994-04-05 |
Sun Microsystems, Inc. |
System for determination of the equivalence of two objects without compromising then done by a third object nominated by one and accetped by the other
|
DE59305159D1
(en)
*
|
1992-04-09 |
1997-02-27 |
Siemens Ag |
METHOD FOR DETECTING AN UNAUTHORIZED REPRODUCTION OF ANY DATA TRANSMITTED FROM A TRANSMITTER TO A RECEIVER
|
AU4400993A
(en)
*
|
1992-06-12 |
1994-01-04 |
Dow Chemical Company, The |
Secure front end communication system and method for process control computers
|
DE69232799T2
(en)
*
|
1992-07-31 |
2003-09-18 |
Micron Technology Inc |
NETWORK SECURITY METHOD AND DEVICE
|
US5611048A
(en)
*
|
1992-10-30 |
1997-03-11 |
International Business Machines Corporation |
Remote password administration for a computer network among a plurality of nodes sending a password update message to all nodes and updating on authorized nodes
|
DE69331064T2
(en)
*
|
1992-12-14 |
2002-07-18 |
Commw Of Australia Canberra |
SECURITY OF AN ELECTRONIC MESSAGE
|
GB2273850A
(en)
*
|
1992-12-22 |
1994-06-29 |
Ibm |
ISDN Call processing
|
US5369707A
(en)
*
|
1993-01-27 |
1994-11-29 |
Tecsec Incorporated |
Secure network method and apparatus
|
US5586260A
(en)
*
|
1993-02-12 |
1996-12-17 |
Digital Equipment Corporation |
Method and apparatus for authenticating a client to a server in computer systems which support different security mechanisms
|
US5379343A
(en)
*
|
1993-02-26 |
1995-01-03 |
Motorola, Inc. |
Detection of unauthorized use of software applications in communication units
|
US5664098A
(en)
*
|
1993-09-28 |
1997-09-02 |
Bull Hn Information Systems Inc. |
Dual decor capability for a host system which runs emulated application programs to enable direct access to host facilities for executing emulated system operations
|
US5572711A
(en)
*
|
1993-09-28 |
1996-11-05 |
Bull Hn Information Systems Inc. |
Mechanism for linking together the files of emulated and host system for access by emulated system users
|
US5675771A
(en)
*
|
1993-09-28 |
1997-10-07 |
Bull Hn Information Systems Inc. |
Mechanism for enabling emulation system users to directly invoke a number of host system facilities for executing host procedures either synchronously or asynchronously in a secure manner through automatically created shell mechanisms
|
US5566326A
(en)
*
|
1993-09-28 |
1996-10-15 |
Bull Hn Information Systems Inc. |
Copy file mechanism for transferring files between a host system and an emulated file system
|
US5680452A
(en)
*
|
1993-10-18 |
1997-10-21 |
Tecsec Inc. |
Distributed cryptographic object method
|
US5369702A
(en)
*
|
1993-10-18 |
1994-11-29 |
Tecsec Incorporated |
Distributed cryptographic object method
|
US5475753A
(en)
*
|
1993-11-12 |
1995-12-12 |
Matsushita Electric Corporation Of America |
Apparatus and method for certifying the delivery of information
|
US5483596A
(en)
*
|
1994-01-24 |
1996-01-09 |
Paralon Technologies, Inc. |
Apparatus and method for controlling access to and interconnection of computer system resources
|
US5509074A
(en)
*
|
1994-01-27 |
1996-04-16 |
At&T Corp. |
Method of protecting electronically published materials using cryptographic protocols
|
JPH07271865A
(en)
*
|
1994-04-01 |
1995-10-20 |
Mitsubishi Corp |
Method for managing copyright of data base
|
US7036019B1
(en)
*
|
1994-04-01 |
2006-04-25 |
Intarsia Software Llc |
Method for controlling database copyrights
|
US6744894B1
(en)
|
1994-04-01 |
2004-06-01 |
Mitsubishi Corporation |
Data management system
|
US5544322A
(en)
*
|
1994-05-09 |
1996-08-06 |
International Business Machines Corporation |
System and method for policy-based inter-realm authentication within a distributed processing system
|
US5511122A
(en)
*
|
1994-06-03 |
1996-04-23 |
The United States Of America As Represented By The Secretary Of The Navy |
Intermediate network authentication
|
US5548646A
(en)
*
|
1994-09-15 |
1996-08-20 |
Sun Microsystems, Inc. |
System for signatureless transmission and reception of data packets between computer networks
|
US5826241A
(en)
|
1994-09-16 |
1998-10-20 |
First Virtual Holdings Incorporated |
Computerized system for making payments and authenticating transactions over the internet
|
US5944794A
(en)
*
|
1994-09-30 |
1999-08-31 |
Kabushiki Kaisha Toshiba |
User identification data management scheme for networking computer systems using wide area network
|
US7302415B1
(en)
*
|
1994-09-30 |
2007-11-27 |
Intarsia Llc |
Data copyright management system
|
US5590266A
(en)
*
|
1994-10-11 |
1996-12-31 |
International Business Machines Corporation |
Integrity mechanism for data transfer in a windowing system
|
US5864683A
(en)
|
1994-10-12 |
1999-01-26 |
Secure Computing Corporartion |
System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
|
US6424715B1
(en)
|
1994-10-27 |
2002-07-23 |
Mitsubishi Corporation |
Digital content management system and apparatus
|
EP1691315A1
(en)
|
1994-10-27 |
2006-08-16 |
Intarsia Software LLC |
Data copyright management system
|
DE69532434T2
(en)
*
|
1994-10-27 |
2004-11-11 |
Mitsubishi Corp. |
Device for file copyright management system
|
JPH08263438A
(en)
|
1994-11-23 |
1996-10-11 |
Xerox Corp |
Distribution and use control system of digital work and access control method to digital work
|
US5655077A
(en)
*
|
1994-12-13 |
1997-08-05 |
Microsoft Corporation |
Method and system for authenticating access to heterogeneous computing services
|
US6011847A
(en)
*
|
1995-06-01 |
2000-01-04 |
Follendore, Iii; Roy D. |
Cryptographic access and labeling system
|
JP3455790B2
(en)
*
|
1995-06-30 |
2003-10-14 |
富士通株式会社 |
Know-how management device used for information retrieval
|
US5812669A
(en)
*
|
1995-07-19 |
1998-09-22 |
Jenkins; Lew |
Method and system for providing secure EDI over an open network
|
JPH0981519A
(en)
*
|
1995-09-08 |
1997-03-28 |
Kiyadeitsukusu:Kk |
Authentication method on network
|
US5757924A
(en)
*
|
1995-09-18 |
1998-05-26 |
Digital Secured Networks Techolognies, Inc. |
Network security device which performs MAC address translation without affecting the IP address
|
US5768503A
(en)
*
|
1995-09-25 |
1998-06-16 |
International Business Machines Corporation |
Middleware program with enhanced security
|
US8595502B2
(en)
*
|
1995-09-29 |
2013-11-26 |
Intarsia Software Llc |
Data management system
|
US5859966A
(en)
*
|
1995-10-10 |
1999-01-12 |
Data General Corporation |
Security system for computer systems
|
JP3982848B2
(en)
*
|
1995-10-19 |
2007-09-26 |
富士通株式会社 |
Security level control device and network communication system
|
US7801817B2
(en)
*
|
1995-10-27 |
2010-09-21 |
Makoto Saito |
Digital content management system and apparatus
|
US7168088B1
(en)
|
1995-11-02 |
2007-01-23 |
Sun Microsystems, Inc. |
Method and apparatus for reliable disk fencing in a multicomputer system
|
US5996075A
(en)
*
|
1995-11-02 |
1999-11-30 |
Sun Microsystems, Inc. |
Method and apparatus for reliable disk fencing in a multicomputer system
|
US6009527A
(en)
*
|
1995-11-13 |
1999-12-28 |
Intel Corporation |
Computer system security
|
US5764887A
(en)
*
|
1995-12-11 |
1998-06-09 |
International Business Machines Corporation |
System and method for supporting distributed computing mechanisms in a local area network server environment
|
US5870475A
(en)
*
|
1996-01-19 |
1999-02-09 |
Northern Telecom Limited |
Facilitating secure communications in a distribution network
|
US5913024A
(en)
*
|
1996-02-09 |
1999-06-15 |
Secure Computing Corporation |
Secure server utilizing separate protocol stacks
|
US5918018A
(en)
|
1996-02-09 |
1999-06-29 |
Secure Computing Corporation |
System and method for achieving network separation
|
US5867647A
(en)
*
|
1996-02-09 |
1999-02-02 |
Secure Computing Corporation |
System and method for securing compiled program code
|
US5768526A
(en)
*
|
1996-03-08 |
1998-06-16 |
Glenayre Electronics, Inc. |
Method and apparatus for validating data packets in a paging system
|
US5761421A
(en)
*
|
1996-03-25 |
1998-06-02 |
Sun Microsystems, Inc. |
System and method for secure peer-to-peer communication between downloaded programs
|
WO1997037305A1
(en)
*
|
1996-03-29 |
1997-10-09 |
Intel Corporation |
Computer system security
|
US6377994B1
(en)
*
|
1996-04-15 |
2002-04-23 |
International Business Machines Corporation |
Method and apparatus for controlling server access to a resource in a client/server system
|
DE19622630C1
(en)
*
|
1996-06-05 |
1997-11-20 |
Siemens Ag |
Method for group-based cryptographic key management between a first computer unit and group computer units
|
US5805820A
(en)
*
|
1996-07-15 |
1998-09-08 |
At&T Corp. |
Method and apparatus for restricting access to private information in domain name systems by redirecting query requests
|
US5828832A
(en)
*
|
1996-07-30 |
1998-10-27 |
Itt Industries, Inc. |
Mixed enclave operation in a computer network with multi-level network security
|
US5832228A
(en)
*
|
1996-07-30 |
1998-11-03 |
Itt Industries, Inc. |
System and method for providing multi-level security in computer devices utilized with non-secure networks
|
US6993582B2
(en)
*
|
1996-07-30 |
2006-01-31 |
Micron Technology Inc. |
Mixed enclave operation in a computer network
|
US6272538B1
(en)
*
|
1996-07-30 |
2001-08-07 |
Micron Technology, Inc. |
Method and system for establishing a security perimeter in computer networks
|
US5787177A
(en)
*
|
1996-08-01 |
1998-07-28 |
Harris Corporation |
Integrated network security access control system
|
US5839088A
(en)
|
1996-08-22 |
1998-11-17 |
Go2 Software, Inc. |
Geographic location referencing system and method
|
US5841869A
(en)
*
|
1996-08-23 |
1998-11-24 |
Cheyenne Property Trust |
Method and apparatus for trusted processing
|
US5692124A
(en)
*
|
1996-08-30 |
1997-11-25 |
Itt Industries, Inc. |
Support of limited write downs through trustworthy predictions in multilevel security of computer network communications
|
US6003084A
(en)
*
|
1996-09-13 |
1999-12-14 |
Secure Computing Corporation |
Secure network proxy for connecting entities
|
US5950195A
(en)
*
|
1996-09-18 |
1999-09-07 |
Secure Computing Corporation |
Generalized security policy management system and method
|
US5983350A
(en)
*
|
1996-09-18 |
1999-11-09 |
Secure Computing Corporation |
Secure firewall supporting different levels of authentication based on address or encryption status
|
US6072942A
(en)
*
|
1996-09-18 |
2000-06-06 |
Secure Computing Corporation |
System and method of electronic mail filtering using interconnected nodes
|
US6499108B1
(en)
|
1996-11-19 |
2002-12-24 |
R. Brent Johnson |
Secure electronic mail system
|
US6578146B2
(en)
|
1996-11-19 |
2003-06-10 |
R. Brent Johnson |
System, method and article of manufacture to remotely configure and utilize an emulated device controller via an encrypted validation communication protocol
|
US5970149A
(en)
*
|
1996-11-19 |
1999-10-19 |
Johnson; R. Brent |
Combined remote access and security system
|
US6006228A
(en)
*
|
1996-12-11 |
1999-12-21 |
Ncr Corporation |
Assigning security levels to particular documents on a document by document basis in a database
|
US5915087A
(en)
*
|
1996-12-12 |
1999-06-22 |
Secure Computing Corporation |
Transparent security proxy for unreliable message exchange protocols
|
US6292900B1
(en)
*
|
1996-12-18 |
2001-09-18 |
Sun Microsystems, Inc. |
Multilevel security attribute passing methods, apparatuses, and computer program products in a stream
|
US5845068A
(en)
*
|
1996-12-18 |
1998-12-01 |
Sun Microsystems, Inc. |
Multilevel security port methods, apparatuses, and computer program products
|
IL130774A0
(en)
*
|
1997-01-03 |
2001-01-28 |
Fortress Technologies Inc |
Improved network security device
|
US7212632B2
(en)
|
1998-02-13 |
2007-05-01 |
Tecsec, Inc. |
Cryptographic key split combiner
|
US6105132A
(en)
*
|
1997-02-20 |
2000-08-15 |
Novell, Inc. |
Computer network graded authentication system and method
|
US5935249A
(en)
*
|
1997-02-26 |
1999-08-10 |
Sun Microsystems, Inc. |
Mechanism for embedding network based control systems in a local network interface device
|
US6408336B1
(en)
|
1997-03-10 |
2002-06-18 |
David S. Schneider |
Distributed administration of access to information
|
US6477648B1
(en)
|
1997-03-23 |
2002-11-05 |
Novell, Inc. |
Trusted workstation in a networked client/server computing system
|
US6035406A
(en)
*
|
1997-04-02 |
2000-03-07 |
Quintet, Inc. |
Plurality-factor security system
|
US6212636B1
(en)
|
1997-05-01 |
2001-04-03 |
Itt Manufacturing Enterprises |
Method for establishing trust in a computer network via association
|
US6694433B1
(en)
|
1997-05-08 |
2004-02-17 |
Tecsec, Inc. |
XML encryption scheme
|
US7290288B2
(en)
|
1997-06-11 |
2007-10-30 |
Prism Technologies, L.L.C. |
Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network
|
US5948136A
(en)
*
|
1997-07-30 |
1999-09-07 |
Sony Corporation |
Hardware authentication mechanism for transmission of data between devices on an IEEE 1394-1995 serial bus network
|
US5919257A
(en)
*
|
1997-08-08 |
1999-07-06 |
Novell, Inc. |
Networked workstation intrusion detection system
|
US6199102B1
(en)
|
1997-08-26 |
2001-03-06 |
Christopher Alan Cobb |
Method and system for filtering electronic messages
|
US6119230A
(en)
*
|
1997-10-01 |
2000-09-12 |
Novell, Inc. |
Distributed dynamic security capabilities
|
DE19745994A1
(en)
*
|
1997-10-20 |
1999-04-22 |
Cit Alcatel |
Process for the exchange of data between application processes in a secure multi-computer system
|
US6275855B1
(en)
|
1997-11-02 |
2001-08-14 |
R. Brent Johnson |
System, method and article of manufacture to enhance computerized alert system information awareness and facilitate real-time intervention services
|
US6202157B1
(en)
|
1997-12-08 |
2001-03-13 |
Entrust Technologies Limited |
Computer network security system and method having unilateral enforceable security policy provision
|
US6061753A
(en)
*
|
1998-01-27 |
2000-05-09 |
Emc Corporation |
Apparatus and method of accessing target devices across a bus utilizing initiator identifiers
|
US8077870B2
(en)
*
|
1998-02-13 |
2011-12-13 |
Tecsec, Inc. |
Cryptographic key split binder for use with tagged data elements
|
US7079653B2
(en)
*
|
1998-02-13 |
2006-07-18 |
Tecsec, Inc. |
Cryptographic key split binding process and apparatus
|
US7095852B2
(en)
*
|
1998-02-13 |
2006-08-22 |
Tecsec, Inc. |
Cryptographic key split binder for use with tagged data elements
|
US6131163A
(en)
*
|
1998-02-17 |
2000-10-10 |
Cisco Technology, Inc. |
Network gateway mechanism having a protocol stack proxy
|
US6175920B1
(en)
*
|
1998-02-20 |
2001-01-16 |
Unisys Corporation |
Expedited message control for synchronous response in a Kerberos domain
|
JPH11259407A
(en)
*
|
1998-03-11 |
1999-09-24 |
Fuji Xerox Co Ltd |
Electronic information use promoting system
|
US6321336B1
(en)
|
1998-03-13 |
2001-11-20 |
Secure Computing Corporation |
System and method for redirecting network traffic to provide secure communication
|
US6453419B1
(en)
*
|
1998-03-18 |
2002-09-17 |
Secure Computing Corporation |
System and method for implementing a security policy
|
US6182226B1
(en)
|
1998-03-18 |
2001-01-30 |
Secure Computing Corporation |
System and method for controlling interactions between networks
|
US6965999B2
(en)
*
|
1998-05-01 |
2005-11-15 |
Microsoft Corporation |
Intelligent trust management method and system
|
US6308273B1
(en)
|
1998-06-12 |
2001-10-23 |
Microsoft Corporation |
Method and system of security location discrimination
|
US6308274B1
(en)
|
1998-06-12 |
2001-10-23 |
Microsoft Corporation |
Least privilege via restricted tokens
|
US6279111B1
(en)
|
1998-06-12 |
2001-08-21 |
Microsoft Corporation |
Security model using restricted tokens
|
US6505300B2
(en)
|
1998-06-12 |
2003-01-07 |
Microsoft Corporation |
Method and system for secure running of untrusted content
|
US6112227A
(en)
|
1998-08-06 |
2000-08-29 |
Heiner; Jeffrey Nelson |
Filter-in method for reducing junk e-mail
|
US6615348B1
(en)
|
1999-04-16 |
2003-09-02 |
Intel Corporation |
Method and apparatus for an adapted digital signature
|
US6085321A
(en)
|
1998-08-14 |
2000-07-04 |
Omnipoint Corporation |
Unique digital signature
|
US6356935B1
(en)
|
1998-08-14 |
2002-03-12 |
Xircom Wireless, Inc. |
Apparatus and method for an authenticated electronic userid
|
JP4763866B2
(en)
|
1998-10-15 |
2011-08-31 |
インターシア ソフトウェア エルエルシー |
Method and apparatus for protecting digital data by double re-encryption
|
AUPP660298A0
(en)
*
|
1998-10-20 |
1998-11-12 |
Canon Kabushiki Kaisha |
Apparatus and method for preventing disclosure of protected information
|
US6185612B1
(en)
|
1998-10-29 |
2001-02-06 |
Novell, Inc. |
Secure distribution and use of weighted network topology information
|
US6839759B2
(en)
|
1998-10-30 |
2005-01-04 |
Science Applications International Corp. |
Method for establishing secure communication link between computers of virtual private network without user entering any cryptographic information
|
US7010604B1
(en)
*
|
1998-10-30 |
2006-03-07 |
Science Applications International Corporation |
Agile network protocol for secure communications with assured system availability
|
US7418504B2
(en)
|
1998-10-30 |
2008-08-26 |
Virnetx, Inc. |
Agile network protocol for secure communications using secure domain names
|
US6502135B1
(en)
*
|
1998-10-30 |
2002-12-31 |
Science Applications International Corporation |
Agile network protocol for secure communications with assured system availability
|
US10511573B2
(en)
|
1998-10-30 |
2019-12-17 |
Virnetx, Inc. |
Agile network protocol for secure communications using secure domain names
|
US6567913B1
(en)
*
|
1998-12-24 |
2003-05-20 |
Pitney Bowes Inc. |
Selective security level certificate meter
|
US7010681B1
(en)
|
1999-01-29 |
2006-03-07 |
International Business Machines Corporation |
Method, system and apparatus for selecting encryption levels based on policy profiling
|
IL128814A
(en)
*
|
1999-03-03 |
2004-09-27 |
Packet Technologies Ltd |
Local network security
|
AU776027C
(en)
|
1999-03-08 |
2005-04-07 |
Spyrus, Inc. |
Method and system for enforcing access to a computing resource using a licensing attribute certificate
|
EP1055990A1
(en)
|
1999-05-28 |
2000-11-29 |
Hewlett-Packard Company |
Event logging in a computing platform
|
EP1056010A1
(en)
*
|
1999-05-28 |
2000-11-29 |
Hewlett-Packard Company |
Data integrity monitoring in trusted computing entity
|
US6816965B1
(en)
*
|
1999-07-16 |
2004-11-09 |
Spyrus, Inc. |
Method and system for a policy enforcing module
|
AU2005202859B2
(en)
*
|
1999-07-16 |
2008-12-04 |
Spyrus, Inc. |
Method and system for a policy enforcing module
|
US6892307B1
(en)
|
1999-08-05 |
2005-05-10 |
Sun Microsystems, Inc. |
Single sign-on framework with trust-level mapping to authentication requirements
|
US6691232B1
(en)
*
|
1999-08-05 |
2004-02-10 |
Sun Microsystems, Inc. |
Security architecture with environment sensitive credential sufficiency evaluation
|
US6668322B1
(en)
|
1999-08-05 |
2003-12-23 |
Sun Microsystems, Inc. |
Access management system and method employing secure credentials
|
US6609198B1
(en)
|
1999-08-05 |
2003-08-19 |
Sun Microsystems, Inc. |
Log-on service providing credential level change without loss of session continuity
|
EP1085396A1
(en)
|
1999-09-17 |
2001-03-21 |
Hewlett-Packard Company |
Operation of trusted state in computing platform
|
GB2355323A
(en)
*
|
1999-10-05 |
2001-04-18 |
Authoriszor Ltd |
Information security profile and policy system
|
US6684253B1
(en)
|
1999-11-18 |
2004-01-27 |
Wachovia Bank, N.A., As Administrative Agent |
Secure segregation of data of two or more domains or trust realms transmitted through a common data channel
|
GB2377059A
(en)
*
|
2000-03-17 |
2002-12-31 |
Ebay Inc |
Method and apparatus for facilitating online payment transactions in a network based transaction facility using multiple payment instruments
|
US7499875B1
(en)
|
2000-03-17 |
2009-03-03 |
Ebay Inc. |
Method and apparatus for facilitating online payment transactions in a network-based transaction facility using multiple payment instruments
|
US8706618B2
(en)
|
2005-09-29 |
2014-04-22 |
Ebay Inc. |
Release of funds based on criteria
|
JP2001282644A
(en)
*
|
2000-03-29 |
2001-10-12 |
Seiko Epson Corp |
Network security system
|
US20040186996A1
(en)
*
|
2000-03-29 |
2004-09-23 |
Gibbs Benjamin K. |
Unique digital signature
|
FR2808147A1
(en)
*
|
2000-04-21 |
2001-10-26 |
Guilhem Peres |
Secure internet information exchange server uses analysis of protocol levels to detect attacks
|
US6622115B1
(en)
*
|
2000-04-28 |
2003-09-16 |
International Business Machines Corporation |
Managing an environment according to environmental preferences retrieved from a personal storage device
|
US6604023B1
(en)
*
|
2000-04-28 |
2003-08-05 |
International Business Machines Corporation |
Managing an environment utilizing a portable data processing system
|
US6636808B1
(en)
|
2000-04-28 |
2003-10-21 |
International Business Machines Corporation |
Managing an environment via a universally accessible server system
|
JP2004528609A
(en)
*
|
2000-05-24 |
2004-09-16 |
ボルテール アドバンスト データ セキュリティ リミテッド |
Inter-application communication with filtering
|
US20040073617A1
(en)
|
2000-06-19 |
2004-04-15 |
Milliken Walter Clark |
Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
|
GB0020441D0
(en)
|
2000-08-18 |
2000-10-04 |
Hewlett Packard Co |
Performance of a service on a computing platform
|
GB2376763B
(en)
|
2001-06-19 |
2004-12-15 |
Hewlett Packard Co |
Demonstrating integrity of a compartment of a compartmented operating system
|
KR100501080B1
(en)
*
|
2000-12-19 |
2005-07-18 |
노병희 |
A method and system for distinguishing higher layer protocols of the internet traffic
|
GB2372592B
(en)
|
2001-02-23 |
2005-03-30 |
Hewlett Packard Co |
Information system
|
GB2372594B
(en)
*
|
2001-02-23 |
2004-10-06 |
Hewlett Packard Co |
Trusted computing environment
|
GB2372595A
(en)
*
|
2001-02-23 |
2002-08-28 |
Hewlett Packard Co |
Method of and apparatus for ascertaining the status of a data processing environment.
|
US7284267B1
(en)
*
|
2001-03-08 |
2007-10-16 |
Mcafee, Inc. |
Automatically configuring a computer firewall based on network connection
|
US6920558B2
(en)
*
|
2001-03-20 |
2005-07-19 |
Networks Associates Technology, Inc. |
Method and apparatus for securely and dynamically modifying security policy configurations in a distributed system
|
US6876984B2
(en)
|
2001-05-31 |
2005-04-05 |
Contentguard Holdings, Inc. |
Method and apparatus for establishing usage rights for digital content to be created in the future
|
US7725401B2
(en)
|
2001-05-31 |
2010-05-25 |
Contentguard Holdings, Inc. |
Method and apparatus for establishing usage rights for digital content to be created in the future
|
US8275716B2
(en)
|
2001-05-31 |
2012-09-25 |
Contentguard Holdings, Inc. |
Method and system for subscription digital rights management
|
GB2376761A
(en)
|
2001-06-19 |
2002-12-24 |
Hewlett Packard Co |
An arrangement in which a process is run on a host operating system but may be switched to a guest system if it poses a security risk
|
GB2376764B
(en)
|
2001-06-19 |
2004-12-29 |
Hewlett Packard Co |
Multiple trusted computing environments
|
GB2376765B
(en)
|
2001-06-19 |
2004-12-29 |
Hewlett Packard Co |
Multiple trusted computing environments with verifiable environment identities
|
GB0117429D0
(en)
*
|
2001-07-17 |
2001-09-12 |
Trustis Ltd |
Trust management
|
US7293179B2
(en)
*
|
2001-08-01 |
2007-11-06 |
Johnson R Brent |
System and method for virtual tape management with remote archival and retrieval via an encrypted validation communication protocol
|
US7143052B2
(en)
*
|
2001-08-30 |
2006-11-28 |
Accenture Global Services Gmbh |
Transitive trust network
|
KR100461984B1
(en)
*
|
2001-10-06 |
2004-12-17 |
주식회사 테라스테크놀로지 |
Method for detecting Email virus and inducing clients to cure the detected virus
|
US7370366B2
(en)
*
|
2001-11-16 |
2008-05-06 |
International Business Machines Corporation |
Data management system and method
|
GB2382419B
(en)
|
2001-11-22 |
2005-12-14 |
Hewlett Packard Co |
Apparatus and method for creating a trusted environment
|
US7243853B1
(en)
|
2001-12-04 |
2007-07-17 |
Visa U.S.A. Inc. |
Method and system for facilitating memory and application management on a secured token
|
US7174017B2
(en)
*
|
2002-03-04 |
2007-02-06 |
Lenovo Singapore Pte, Ltd |
Decryption system for encrypted audio
|
US7516182B2
(en)
*
|
2002-06-18 |
2009-04-07 |
Aol Llc |
Practical techniques for reducing unsolicited electronic messages by identifying sender's addresses
|
US7219234B1
(en)
|
2002-07-24 |
2007-05-15 |
Unisys Corporation |
System and method for managing access rights and privileges in a data processing system
|
WO2004017592A1
(en)
|
2002-08-19 |
2004-02-26 |
Research In Motion Limited |
System and method for secure control of resources of wireless mobile communication device
|
US7698441B2
(en)
*
|
2002-10-03 |
2010-04-13 |
International Business Machines Corporation |
Intelligent use of user data to pre-emptively prevent execution of a query violating access controls
|
US20040139021A1
(en)
|
2002-10-07 |
2004-07-15 |
Visa International Service Association |
Method and system for facilitating data access and management on a secure token
|
US7568218B2
(en)
*
|
2002-10-31 |
2009-07-28 |
Microsoft Corporation |
Selective cross-realm authentication
|
US6928554B2
(en)
*
|
2002-10-31 |
2005-08-09 |
International Business Machines Corporation |
Method of query return data analysis for early warning indicators of possible security exposures
|
US7591001B2
(en)
*
|
2004-05-14 |
2009-09-15 |
Liquidware Labs, Inc. |
System, apparatuses, methods and computer-readable media for determining the security status of a computer before establishing a network connection
|
US7549159B2
(en)
*
|
2004-05-10 |
2009-06-16 |
Liquidware Labs, Inc. |
System, apparatuses, methods and computer-readable media for determining the security status of a computer before establishing connection thereto
|
US7660980B2
(en)
*
|
2002-11-18 |
2010-02-09 |
Liquidware Labs, Inc. |
Establishing secure TCP/IP communications using embedded IDs
|
US7386889B2
(en)
*
|
2002-11-18 |
2008-06-10 |
Trusted Network Technologies, Inc. |
System and method for intrusion prevention in a communications network
|
US20060098649A1
(en)
*
|
2004-11-10 |
2006-05-11 |
Trusted Network Technologies, Inc. |
System, apparatuses, methods, and computer-readable media for determining security realm identity before permitting network connection
|
US7620691B1
(en)
|
2003-02-10 |
2009-11-17 |
Aol Llc |
Filtering electronic messages while permitting delivery of solicited electronics messages
|
US7392246B2
(en)
*
|
2003-02-14 |
2008-06-24 |
International Business Machines Corporation |
Method for implementing access control for queries to a content management system
|
US7290033B1
(en)
*
|
2003-04-18 |
2007-10-30 |
America Online, Inc. |
Sorting electronic messages using attributes of the sender address
|
US7590695B2
(en)
|
2003-05-09 |
2009-09-15 |
Aol Llc |
Managing electronic messages
|
US7739602B2
(en)
|
2003-06-24 |
2010-06-15 |
Aol Inc. |
System and method for community centric resource sharing based on a publishing subscription model
|
US7526640B2
(en)
*
|
2003-06-30 |
2009-04-28 |
Microsoft Corporation |
System and method for automatic negotiation of a security protocol
|
US7627635B1
(en)
|
2003-07-28 |
2009-12-01 |
Aol Llc |
Managing self-addressed electronic messages
|
US7734844B2
(en)
*
|
2003-08-19 |
2010-06-08 |
General Dynamics Advanced Information Systems, Inc. |
Trusted interface unit (TIU) and method of making and using the same
|
US7530112B2
(en)
|
2003-09-10 |
2009-05-05 |
Cisco Technology, Inc. |
Method and apparatus for providing network security using role-based access control
|
GB0322891D0
(en)
*
|
2003-09-30 |
2003-10-29 |
Nokia Corp |
Communication method
|
US7899918B1
(en)
|
2003-10-10 |
2011-03-01 |
Cisco Technology, Inc. |
Service accounting in a network
|
US7836490B2
(en)
|
2003-10-29 |
2010-11-16 |
Cisco Technology, Inc. |
Method and apparatus for providing network security using security labeling
|
US20050125667A1
(en)
*
|
2003-12-09 |
2005-06-09 |
Tim Sullivan |
Systems and methods for authorizing delivery of incoming messages
|
WO2005062843A2
(en)
*
|
2003-12-19 |
2005-07-14 |
America On Line, Inc |
Community messaging lists for authorization to deliver electronic messages
|
US20050193130A1
(en)
*
|
2004-01-22 |
2005-09-01 |
Mblx Llc |
Methods and systems for confirmation of availability of messaging account to user
|
US7469292B2
(en)
*
|
2004-02-11 |
2008-12-23 |
Aol Llc |
Managing electronic messages using contact information
|
US20050251854A1
(en)
*
|
2004-05-10 |
2005-11-10 |
Trusted Network Technologies, Inc. |
System, apparatuses, methods and computer-readable media for determining security status of computer before establishing connection thereto first group of embodiments-claim set III
|
US20050256957A1
(en)
*
|
2004-05-14 |
2005-11-17 |
Trusted Network Technologies, Inc. |
System, apparatuses, methods and computer-readable media for determining security status of computer before establishing network connection second group of embodiments-claim set III
|
US7386724B2
(en)
|
2004-06-17 |
2008-06-10 |
International Business Machines Corporation |
Assigning security levels to a shared component
|
US7669244B2
(en)
|
2004-10-21 |
2010-02-23 |
Cisco Technology, Inc. |
Method and system for generating user group permission lists
|
US7877796B2
(en)
|
2004-11-16 |
2011-01-25 |
Cisco Technology, Inc. |
Method and apparatus for best effort propagation of security group information
|
US7886145B2
(en)
|
2004-11-23 |
2011-02-08 |
Cisco Technology, Inc. |
Method and system for including security information with a packet
|
US7721323B2
(en)
|
2004-11-23 |
2010-05-18 |
Cisco Technology, Inc. |
Method and system for including network security information in a frame
|
US7827402B2
(en)
|
2004-12-01 |
2010-11-02 |
Cisco Technology, Inc. |
Method and apparatus for ingress filtering using security group information
|
US7650383B2
(en)
*
|
2005-03-15 |
2010-01-19 |
Aol Llc |
Electronic message system with federation of trusted senders
|
EP2194476B1
(en)
|
2005-03-22 |
2014-12-03 |
Hewlett-Packard Development Company, L.P. |
Method and apparatus for creating a record of a software-verification attestation
|
US7647381B2
(en)
*
|
2005-04-04 |
2010-01-12 |
Aol Llc |
Federated challenge credit system
|
US20060288207A1
(en)
*
|
2005-06-17 |
2006-12-21 |
Research In Motion Limited |
Encoding messages for use in a communication system based on classificaiton status
|
US9418040B2
(en)
*
|
2005-07-07 |
2016-08-16 |
Sciencelogic, Inc. |
Dynamically deployable self configuring distributed network management system
|
US7941668B2
(en)
*
|
2005-07-08 |
2011-05-10 |
Stapleton Jeff J |
Method and system for securely managing application transactions using cryptographic techniques
|
US10764264B2
(en)
|
2005-07-11 |
2020-09-01 |
Avaya Inc. |
Technique for authenticating network users
|
CN101305375A
(en)
*
|
2005-09-12 |
2008-11-12 |
沙盒技术有限公司 |
System and method for controlling distribution of electronic information
|
US20070088793A1
(en)
*
|
2005-10-17 |
2007-04-19 |
Landsman Richard A |
Filter for instant messaging
|
WO2007055684A2
(en)
*
|
2005-11-09 |
2007-05-18 |
Trusted Network Technologies, Inc. |
Determining security realm identity before permitting network connection
|
JP2007213397A
(en)
*
|
2006-02-10 |
2007-08-23 |
Fuji Xerox Co Ltd |
Data management program, data management device and switching method of protocol
|
US8127133B2
(en)
*
|
2007-01-25 |
2012-02-28 |
Microsoft Corporation |
Labeling of data objects to apply and enforce policies
|
TW200839561A
(en)
*
|
2007-03-22 |
2008-10-01 |
Wistron Corp |
Method of irregular password configuration and verification
|
US7853992B2
(en)
*
|
2007-05-31 |
2010-12-14 |
Microsoft Corporation |
Configuring security mechanisms utilizing a trust system
|
US7840708B2
(en)
|
2007-08-13 |
2010-11-23 |
Cisco Technology, Inc. |
Method and system for the assignment of security group information using a proxy
|
US8819164B2
(en)
|
2007-08-31 |
2014-08-26 |
Microsoft Corporation |
Versioning management
|
US8302154B2
(en)
*
|
2007-11-10 |
2012-10-30 |
International Business Machines Corporation |
Automatic and adjustable system and method for synchronizing security mechanisms in database drivers with database servers
|
US20090216678A1
(en)
*
|
2008-02-25 |
2009-08-27 |
Research In Motion Limited |
System and method for facilitating secure communication of messages associated with a project
|
US8284944B2
(en)
*
|
2008-03-13 |
2012-10-09 |
International Business Machines Corporation |
Unified and persistent system and method for automatic configuration of encryption
|
US7530106B1
(en)
|
2008-07-02 |
2009-05-05 |
Kaspersky Lab, Zao |
System and method for security rating of computer processes
|
JP2010093596A
(en)
*
|
2008-10-09 |
2010-04-22 |
Hitachi Ltd |
Display system and receiver
|
US20110197144A1
(en)
*
|
2010-01-06 |
2011-08-11 |
Terry Coatta |
Method And System Of Providing A Viewing Experience With Respect To A Document Having Read-only Content
|
US10326734B2
(en)
|
2013-07-15 |
2019-06-18 |
University Of Florida Research Foundation, Incorporated |
Adaptive identity rights management system for regulatory compliance and privacy protection
|
US11595444B2
(en)
|
2020-12-03 |
2023-02-28 |
International Business Machines Corporation |
Authenticity assessment of a requestor based on a communication request
|