Movatterモバイル変換


[0]ホーム

URL:


US20020053020A1 - Secure compartmented mode knowledge management portal - Google Patents

Secure compartmented mode knowledge management portal
Download PDF

Info

Publication number
US20020053020A1
US20020053020A1US09/892,281US89228101AUS2002053020A1US 20020053020 A1US20020053020 A1US 20020053020A1US 89228101 AUS89228101 AUS 89228101AUS 2002053020 A1US2002053020 A1US 2002053020A1
Authority
US
United States
Prior art keywords
user
document
access
zone
based management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US09/892,281
Inventor
Daniel Teijido
Joseph Silcox
Robert Moehl
Craig Kobren
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Raytheon Co
Original Assignee
Raytheon Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Raytheon CofiledCriticalRaytheon Co
Priority to US09/892,281priorityCriticalpatent/US20020053020A1/en
Priority to AU2001279279Aprioritypatent/AU2001279279A1/en
Priority to PCT/US2001/041213prioritypatent/WO2002003180A2/en
Publication of US20020053020A1publicationCriticalpatent/US20020053020A1/en
Assigned to RAYTHEON COMPANYreassignmentRAYTHEON COMPANYASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: KOBREN, CRAIG H., MOEHL, ROBERT C., SILCOX, JOSEPH M., TEIJIDO, DANIEL (NMI)
Priority to US11/357,583prioritypatent/US20070174627A1/en
Priority to US11/674,932prioritypatent/US7921289B2/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A layered defense-in-depth knowledge-based data management comprises a reception zone for authenticating a user for access to the system and an operations zone for adjudicating on a user level access to data objects stored in the system database. In addition, the data management comprises a security zone for issuing certificates of accessibility for defined users and a screening zone to interrogate data packets during processing thereof. The first line of defense is firewall protection and packet filtering preceding the reception zone.

Description

Claims (21)

What is claimed is:
1. A layered defense-in-depth knowledge-based management system, comprising:
a reception zone for authenticating a user for access to the system;
an operations zone for adjudicating on a user level access to the data objects stored in a system database; and
a security zone for issuing certificates of accessibility for defined users.
2. A layered defense-in-depth knowledge-based management system as inclaim 1 further comprises revoking certificates for users no longer allowed access to the system.
3. A layered defense-in-depth knowledge-based management system as inclaim 2, wherein the security zone further comprises performing key recovery operations.
4. A layered defense-in-depth knowledge-based management system as inclaim 1, wherein the security zone further comprises filters to control and limit access to a predefined set of user workstations.
5. A layered defense-in-depth knowledge-based management system as inclaim 1, wherein the reception zone comprises a public key infrastructure for authenticating users for accessing contents of the system.
6. A layered defense-in-depth knowledge-based management system, comprising:
a reception zone for authenticating a user for access to the system;
a screening zone to interrogate data packets during processing thereof;
an operations zone for adjudicating on the user level access to the data objects stored in a system database; and
a security zone for issuing certificates of accessibility for defined users, revoke certificates for users no longer allowed access to the system, and performing key recovering operations.
7. A layered defense-in-depth knowledge-based management system as set forth inclaim 6, wherein the reception zone comprises a public key infrastructure for authenticating users for accessing contents of the system.
8. A layered defense-in-depth knowledge-based management system as inclaim 6, wherein the operations zone comprises packet filtering for incoming and outgoing messages.
9. A layered defense-in-depth knowledge-based management system as inclaim 6, wherein the security zone comprises packet filtering of incoming and outgoing messages for access control.
10. A layered defense-in-depth knowledge-based management system as inclaim 6, wherein the operations zone comprises a document management server for establishing access to data stored in a library of the management system.
11. A method of layered defense-in-depth knowledge-based management, comprising:
authenticating a user of the knowledge base;
determine the clearance level of a requested document by the authenticated user;
determine the clearance level of the authenticated user;
comparing the clearance level of the document with the clearance level of the authenticated user; and
displaying the secure document to the authenticated user in response to the clearance level of the user dominating the clearance level of the requested document.
12. The method of layered defense-in-depth knowledge-based management as set forth inclaim 11, further comprising determining the allowance of both a document caveat and clearance access in response to the comparison of the clearance level of a document with the clearance level of the authenticated user prior to displaying the secure document.
13. The method of layered defense-in-depth knowledge-based management as inclaim 11, further comprising encrypting and signing the authenticated user prior to determining the clearance level of a requested document.
14. The method of layered defense-in-depth knowledge-based management as inclaim 11, wherein authenticating a user comprises a certificate authority program running on a server.
15. A method of layered defense-in-depth knowledge-based management, comprising:
authenticating a user of the knowledge base;
determine the clearance level of a requested secure document;
determine the clearance level of the authenticated user;
comparing the clearance level of the requested document with the clearance level of the authenticated user;
obtain a document caveat;
obtain an authenticated user caveat;
comparing the authenticated user caveat with the document caveat to allow access to the obtained document caveat;
determining the access allowability of the obtained document caveat;
determine the allowance of both the document caveat and the clearance access to identify clearance of the authorized user to the requested secure document; and
displaying the secure document to the authenticated user.
16. The method of layered defense-in-depth knowledge-based management as inclaim 15, further comprising multiple authentication of a user prior to comparing the clearance level of the requested document with the clearance level of the authenticated user.
17. A method of accessing an electronic support library for layered defense-in-depth knowledge-based management, comprising:
authenticating in a reception zone a user in response to a request for data;
document manipulation and administration in an operations zone of a request by an authenticated user; and
issuing authorization certificates in a security zone for users to allow access to data managed in the operations zone.
18. The method of accessing an electronic support library as inclaim 17, wherein authenticating a user in the reception zone comprises authenticating the user to a public key infrastructure.
19. The method of accessing an electronic support library as inclaim 17, further comprising accessing data stored in the electronic support library by a document management server.
20. The method of accessing an electronic support library as inclaim 17, further comprising packet filtering incoming and outgoing messages in and through the operations zone.
21. The method of accessing an electronic support library as in claim20, further comprising packet filtering incoming and outgoing messages for access to authorization certificates issued by the security zone.
US09/892,2812000-06-302001-06-26Secure compartmented mode knowledge management portalAbandonedUS20020053020A1 (en)

Priority Applications (5)

Application NumberPriority DateFiling DateTitle
US09/892,281US20020053020A1 (en)2000-06-302001-06-26Secure compartmented mode knowledge management portal
AU2001279279AAU2001279279A1 (en)2000-06-302001-06-28Secure compartmented mode knowledge management portal
PCT/US2001/041213WO2002003180A2 (en)2000-06-302001-06-28Layered defense-in-depth knowledge-based data management
US11/357,583US20070174627A1 (en)2000-06-302006-02-16Secure compartmented mode knowledge management portal
US11/674,932US7921289B2 (en)2000-06-302007-02-14Secure compartmented mode knowledge management portal

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US21559400P2000-06-302000-06-30
US09/892,281US20020053020A1 (en)2000-06-302001-06-26Secure compartmented mode knowledge management portal

Related Child Applications (2)

Application NumberTitlePriority DateFiling Date
US11/357,583DivisionUS20070174627A1 (en)2000-06-302006-02-16Secure compartmented mode knowledge management portal
US11/674,932DivisionUS7921289B2 (en)2000-06-302007-02-14Secure compartmented mode knowledge management portal

Publications (1)

Publication NumberPublication Date
US20020053020A1true US20020053020A1 (en)2002-05-02

Family

ID=26910193

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US09/892,281AbandonedUS20020053020A1 (en)2000-06-302001-06-26Secure compartmented mode knowledge management portal
US11/357,583AbandonedUS20070174627A1 (en)2000-06-302006-02-16Secure compartmented mode knowledge management portal
US11/674,932Expired - LifetimeUS7921289B2 (en)2000-06-302007-02-14Secure compartmented mode knowledge management portal

Family Applications After (2)

Application NumberTitlePriority DateFiling Date
US11/357,583AbandonedUS20070174627A1 (en)2000-06-302006-02-16Secure compartmented mode knowledge management portal
US11/674,932Expired - LifetimeUS7921289B2 (en)2000-06-302007-02-14Secure compartmented mode knowledge management portal

Country Status (3)

CountryLink
US (3)US20020053020A1 (en)
AU (1)AU2001279279A1 (en)
WO (1)WO2002003180A2 (en)

Cited By (59)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020078049A1 (en)*2000-12-152002-06-20Vipin SamarMethod and apparatus for management of encrypted data through role separation
US20020198973A1 (en)*2001-04-302002-12-26Besaw Lawrence M.System for dynamic customer filtering of management information presented through a web-based portal
US20030005326A1 (en)*2001-06-292003-01-02Todd FlemmingMethod and system for implementing a security application services provider
US20030065953A1 (en)*2001-09-282003-04-03Siemens AktiengesellshaftProxy unit, method for the computer-assisted protection of an application server program, a system having a proxy unit and a unit for executing an application server program
US20030196108A1 (en)*2002-04-122003-10-16Kung Kenneth C.System and techniques to bind information objects to security labels
US20030204720A1 (en)*2002-04-262003-10-30Isadore SchoenSecure instant messaging system using instant messaging group policy certificates
US20030204722A1 (en)*2002-04-262003-10-30Isadore SchoenInstant messaging apparatus and method with instant messaging secure policy certificates
US20030204741A1 (en)*2002-04-262003-10-30Isadore SchoenSecure PKI proxy and method for instant messaging clients
US20040254911A1 (en)*2000-12-222004-12-16Xerox CorporationRecommender system and method
US20050008001A1 (en)*2003-02-142005-01-13John Leslie WilliamsSystem and method for interfacing with heterogeneous network data gathering tools
US20050086068A1 (en)*2002-12-062005-04-21Benjamin QuigleySystem and method for electronic wallet conversion
US20050114397A1 (en)*2003-04-042005-05-26Computer Associates Think, Inc.Method and system for management and configuration of remote agents
US20050138359A1 (en)*2003-12-172005-06-23Simon Daniel R.Mesh networks with exclusion capability
US20050135268A1 (en)*2003-12-172005-06-23Simon Daniel R.Mesh networks with end device recognition
US20050154986A1 (en)*2004-01-092005-07-14International Business Machines CorporationDynamic composition of help information for an aggregation of applications
US20050154719A1 (en)*2004-01-092005-07-14International Business Machines CorporationSearch and query operations in a dynamic composition of help information for an aggregation of applications
US20050257267A1 (en)*2003-02-142005-11-17Williams John LNetwork audit and policy assurance system
US20060031849A1 (en)*2004-04-062006-02-09International Business Machines CorporationUser task interface in a Web application
US20060048228A1 (en)*2004-08-302006-03-02Kddi Corporation; Keio UniversityCommunication system and security assurance device
US20060080539A1 (en)*2002-05-292006-04-13Akiko AsamiInformation processing system
US20060161991A1 (en)*2005-01-142006-07-20I Anson ColinProvision of services over a common delivery platform such as a mobile telephony network
US20060161616A1 (en)*2005-01-142006-07-20I Anson ColinProvision of services over a common delivery platform such as a mobile telephony network
US20060161619A1 (en)*2005-01-142006-07-20I Anson ColinProvision of services over a common delivery platform such as a mobile telephony network
US20060215448A1 (en)*2005-03-282006-09-28Ellis Nigel RMapping of a file system model to a database object
US20070067589A1 (en)*2005-09-202007-03-22Cisco Technology, Inc.Smart zoning to enforce interoperability matrix in a storage area network
US20070198555A1 (en)*2006-02-212007-08-23International Business Machines CorporationMethod, system, and program product for transferring document attributes
US20070206511A1 (en)*2006-03-032007-09-06The Boeing CompanyCapability-based testing and evaluation of network performance
US20070274337A1 (en)*2006-03-032007-11-29The Boeing CompanySupporting network self-healing and optimization
US20070297447A1 (en)*2006-03-032007-12-27The Boeing CompanySupporting application effectiveness in a network environment
US20080034414A1 (en)*2001-09-282008-02-07Juniper Networks, Inc.Method and apparatus for implementing a layer 3/layer 7 firewall in an l2 device
US20080077603A1 (en)*2006-09-222008-03-27Sun Microsystems, Inc.Automated product knowledge catalog
US20080114709A1 (en)*2005-05-032008-05-15Dixon Christopher JSystem, method, and computer program product for presenting an indicia of risk associated with search results within a graphical user interface
US20080120599A1 (en)*2006-11-222008-05-22I Anson ColinProvision of services over a common delivery platform such as a mobile telephony network
US20080126415A1 (en)*2006-11-292008-05-29Google Inc.Digital Image Archiving and Retrieval in a Mobile Device System
US20080162602A1 (en)*2006-12-282008-07-03Google Inc.Document archiving system
US20080162603A1 (en)*2006-12-282008-07-03Google Inc.Document archiving system
US20080270929A1 (en)*2004-03-052008-10-30International Business Machines CorporationFederating Legacy/Remote Content into a Central Network Console
US20090044152A1 (en)*2004-03-052009-02-12International Business Machines CorporationUsing content aggregation to build administration consoles
US20090259748A1 (en)*2002-01-152009-10-15Mcclure Stuart CSystem and method for network vulnerability detection and reporting
US20090319529A1 (en)*2008-06-202009-12-24Raytheon CompanyInformation Rights Management
US20100146593A1 (en)*2008-12-052010-06-10Raytheon CompanySecure Document Management
US8135823B2 (en)2002-01-152012-03-13Mcafee, Inc.System and method for network vulnerability detection and reporting
US8201257B1 (en)2004-03-312012-06-12Mcafee, Inc.System and method of managing network security risks
US20120173497A1 (en)*2011-01-022012-07-05Cisco Technology, Inc.Defense-in-depth security for bytecode executables
US8347321B1 (en)*2006-03-302013-01-01Emc CorporationIn place object reconstruction
US20140006268A1 (en)*2006-07-272014-01-02Blackhawk Network, Inc.System and Method for Targeted Marketing and Consumer Resource Management
US20140281482A1 (en)*2013-03-152014-09-18Low Gravity Innovation, Inc.Secure storage and sharing of user objects
US20150096049A1 (en)*2005-02-182015-04-02Protegrity CorporationMulti-layer system for privacy enforcement and monitoring of suspicious data access behavior
AU2012242707B2 (en)*2011-04-122015-06-04Teletech Holdings, Inc.Methods for providing cross-vendor support services
US9077739B2 (en)*2006-11-282015-07-07Cisco Technology, Inc.Messaging security device
US9081982B2 (en)2011-04-182015-07-14Raytheon CompanyAuthorized data access based on the rights of a user and a location
US9178994B2 (en)2011-04-122015-11-03Teletech Holdings, Inc.Methods for providing self-support services using information from a viral source
US20180026967A1 (en)*2016-07-222018-01-25Fuji Xerox Co., Ltd.Information processing apparatus, security system, and non-transitory computer readable medium
WO2018177720A1 (en)*2017-03-312018-10-04Siemens Mobility GmbHMethod for controlling access of an electronic device to a system and security device
CN109981531A (en)*2017-12-272019-07-05航天信息股份有限公司A kind of tax outer net safety access method and system based on tax digital certificate
US10510465B1 (en)*2019-03-192019-12-17Global Broadband Solutions, LLCMethods and systems for securely accessing and managing aggregated submarine cable system information
US10560428B2 (en)*2017-08-172020-02-11Texas Instruments IncorporatedFlexible hybrid firewall architecture
US20210377240A1 (en)*2020-06-022021-12-02FLEX Integration LLCSystem and methods for tokenized hierarchical secured asset distribution
US20240137362A1 (en)*2018-06-082024-04-25Wells Fargo Bank, N.A.Two-way authentication system and method

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020053020A1 (en)*2000-06-302002-05-02Raytheon CompanySecure compartmented mode knowledge management portal
US7185009B2 (en)*2003-03-312007-02-27Taiwan Semiconductor Manufacturing CompanyIC foundry manufacturing technology master data management structure
US20070294336A1 (en)*2004-07-022007-12-20Greg PoundsProxy-based communications architecture
US8151358B1 (en)*2005-04-072012-04-03Aol Inc.Annotation of digital items in a shared list
US8181010B1 (en)*2006-04-172012-05-15Oracle America, Inc.Distributed authentication user interface system
US8505074B2 (en)*2008-11-212013-08-06Sharp Laboratories Of America, Inc.Selective web content controls for MFP web pages across firewalls
CN101640787B (en)*2009-08-242011-10-26中兴通讯股份有限公司Method and device for hierarchical control access of multicast group
TW201215070A (en)*2010-06-142012-04-01Revere Security CorpKey Management Systems and methods for shared secret ciphers
US8528099B2 (en)*2011-01-272013-09-03Oracle International CorporationPolicy based management of content rights in enterprise/cross enterprise collaboration
US8959656B1 (en)*2012-03-032015-02-17Joingo, LlcSegmented architecture method and system
JP5929369B2 (en)*2012-03-162016-06-01日本電気株式会社 Information processing apparatus including electronic document database, illegally stored document detection method, and program
US9232402B2 (en)2013-11-212016-01-05At&T Intellectual Property I, L.P.System and method for implementing a two-person access rule using mobile devices
CN104410495B (en)*2014-11-192018-03-27天津南大通用数据技术股份有限公司Catalogue certification implementation method based on LDAPV3 control operations
US9881145B2 (en)*2015-04-222018-01-30Avaya Inc.Adding features and services without password exposure
US20170344886A1 (en)*2016-05-252017-11-30Tse-Kin TongKnowledge Management System also known as Computer Machinery for Knowledge Management
US11366901B2 (en)2020-10-072022-06-21Bank Of America CorporationSystem and method for identifying insider threats in source code
US12124584B2 (en)2021-08-052024-10-22Bank Of America CorporationSystem and method for detecting insider threats in source code

Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5276901A (en)*1991-12-161994-01-04International Business Machines CorporationSystem for controlling group access to objects using group access control folder and group identification as individual user
US5765152A (en)*1995-10-131998-06-09Trustees Of Dartmouth CollegeSystem and method for managing copyrighted electronic media
US5940591A (en)*1991-07-111999-08-17Itt CorporationApparatus and method for providing network security
US5996077A (en)*1997-06-161999-11-30Cylink CorporationAccess control system and method using hierarchical arrangement of security devices
US6408336B1 (en)*1997-03-102002-06-18David S. SchneiderDistributed administration of access to information
US6950943B1 (en)*1998-12-232005-09-27International Business Machines CorporationSystem for electronic repository of data enforcing access control on data search and retrieval

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5315657A (en)*1990-09-281994-05-24Digital Equipment CorporationCompound principals in access control lists
US5737419A (en)*1994-11-091998-04-07Bell Atlantic Network Services, Inc.Computer system for securing communications using split private key asymmetric cryptography
US5625877A (en)*1995-03-151997-04-29International Business Machines CorporationWireless variable bandwidth air-link system
US5872847A (en)*1996-07-301999-02-16Itt Industries, Inc.Using trusted associations to establish trust in a computer network
US6167438A (en)*1997-05-222000-12-26Trustees Of Boston UniversityMethod and system for distributed caching, prefetching and replication
FI972739A0 (en)*1997-06-251997-06-25Ericsson Telefon Ab L M Foerfarande och system Foer komunikation
US6549626B1 (en)*1997-10-202003-04-15Sun Microsystems, Inc.Method and apparatus for encoding keys
US6160891A (en)*1997-10-202000-12-12Sun Microsystems, Inc.Methods and apparatus for recovering keys
JP3995338B2 (en)*1998-05-272007-10-24富士通株式会社 Network connection control method and system
US7457279B1 (en)*1999-09-102008-11-25Vertical Communications Acquisition Corp.Method, system, and computer program product for managing routing servers and services
US6772340B1 (en)*2000-01-142004-08-03Microsoft CorporationDigital rights management system operating on computing device and having black box tied to computing device
US20020053020A1 (en)*2000-06-302002-05-02Raytheon CompanySecure compartmented mode knowledge management portal
US7228438B2 (en)*2001-04-302007-06-05Matsushita Electric Industrial Co., Ltd.Computer network security system employing portable storage device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5940591A (en)*1991-07-111999-08-17Itt CorporationApparatus and method for providing network security
US5276901A (en)*1991-12-161994-01-04International Business Machines CorporationSystem for controlling group access to objects using group access control folder and group identification as individual user
US5765152A (en)*1995-10-131998-06-09Trustees Of Dartmouth CollegeSystem and method for managing copyrighted electronic media
US6408336B1 (en)*1997-03-102002-06-18David S. SchneiderDistributed administration of access to information
US5996077A (en)*1997-06-161999-11-30Cylink CorporationAccess control system and method using hierarchical arrangement of security devices
US6950943B1 (en)*1998-12-232005-09-27International Business Machines CorporationSystem for electronic repository of data enforcing access control on data search and retrieval

Cited By (133)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7315859B2 (en)*2000-12-152008-01-01Oracle International Corp.Method and apparatus for management of encrypted data through role separation
US20020078049A1 (en)*2000-12-152002-06-20Vipin SamarMethod and apparatus for management of encrypted data through role separation
US20040254911A1 (en)*2000-12-222004-12-16Xerox CorporationRecommender system and method
US7386547B2 (en)*2000-12-222008-06-10Xerox CorporationRecommender system and method
US20020198973A1 (en)*2001-04-302002-12-26Besaw Lawrence M.System for dynamic customer filtering of management information presented through a web-based portal
US20030005326A1 (en)*2001-06-292003-01-02Todd FlemmingMethod and system for implementing a security application services provider
US20080034414A1 (en)*2001-09-282008-02-07Juniper Networks, Inc.Method and apparatus for implementing a layer 3/layer 7 firewall in an l2 device
US7779459B2 (en)*2001-09-282010-08-17Juniper Networks, Inc.Method and apparatus for implementing a layer 3/layer 7 firewall in an L2 device
US20030065953A1 (en)*2001-09-282003-04-03Siemens AktiengesellshaftProxy unit, method for the computer-assisted protection of an application server program, a system having a proxy unit and a unit for executing an application server program
US9407605B2 (en)2001-09-282016-08-02Juniper Networks, Inc.Routing a packet by a device
US20100281533A1 (en)*2001-09-282010-11-04Juniper Networks, Inc.Method and apparatus for implementing a layer 3/layer 7 firewall in an l2 device
US8689316B2 (en)2001-09-282014-04-01Juniper Networks, Inc.Routing a packet by a device
US8291114B2 (en)*2001-09-282012-10-16Juniper Networks, Inc.Routing a packet by a device
US8621060B2 (en)2002-01-152013-12-31Mcafee, Inc.System and method for network vulnerability detection and reporting
US20090259748A1 (en)*2002-01-152009-10-15Mcclure Stuart CSystem and method for network vulnerability detection and reporting
US8700767B2 (en)2002-01-152014-04-15Mcafee, Inc.System and method for network vulnerability detection and reporting
US8135823B2 (en)2002-01-152012-03-13Mcafee, Inc.System and method for network vulnerability detection and reporting
US8135830B2 (en)2002-01-152012-03-13Mcafee, Inc.System and method for network vulnerability detection and reporting
US8661126B2 (en)2002-01-152014-02-25Mcafee, Inc.System and method for network vulnerability detection and reporting
US8615582B2 (en)2002-01-152013-12-24Mcafee, Inc.System and method for network vulnerability detection and reporting
US8621073B2 (en)2002-01-152013-12-31Mcafee, Inc.System and method for network vulnerability detection and reporting
US20030196108A1 (en)*2002-04-122003-10-16Kung Kenneth C.System and techniques to bind information objects to security labels
US20030204741A1 (en)*2002-04-262003-10-30Isadore SchoenSecure PKI proxy and method for instant messaging clients
US20030204720A1 (en)*2002-04-262003-10-30Isadore SchoenSecure instant messaging system using instant messaging group policy certificates
US7321969B2 (en)*2002-04-262008-01-22Entrust LimitedSecure instant messaging system using instant messaging group policy certificates
US20030204722A1 (en)*2002-04-262003-10-30Isadore SchoenInstant messaging apparatus and method with instant messaging secure policy certificates
US20060080539A1 (en)*2002-05-292006-04-13Akiko AsamiInformation processing system
US8601277B2 (en)*2002-05-292013-12-03Sony CorporationInformation processing system
US20050086068A1 (en)*2002-12-062005-04-21Benjamin QuigleySystem and method for electronic wallet conversion
US20100332336A9 (en)*2002-12-062010-12-30Benjamin QuigleySystem and method for electronic wallet conversion
US8473355B2 (en)2002-12-062013-06-25Facebook, Inc.System and method for electronic wallet conversion
US9094434B2 (en)2003-02-142015-07-28Mcafee, Inc.System and method for automated policy audit and remediation management
US8561175B2 (en)2003-02-142013-10-15Preventsys, Inc.System and method for automated policy audit and remediation management
US8091117B2 (en)*2003-02-142012-01-03Preventsys, Inc.System and method for interfacing with heterogeneous network data gathering tools
US20050257267A1 (en)*2003-02-142005-11-17Williams John LNetwork audit and policy assurance system
US7627891B2 (en)2003-02-142009-12-01Preventsys, Inc.Network audit and policy assurance system
US8793763B2 (en)2003-02-142014-07-29Preventsys, Inc.System and method for interfacing with heterogeneous network data gathering tools
US7624422B2 (en)2003-02-142009-11-24Preventsys, Inc.System and method for security information normalization
US8789140B2 (en)2003-02-142014-07-22Preventsys, Inc.System and method for interfacing with heterogeneous network data gathering tools
US20050008001A1 (en)*2003-02-142005-01-13John Leslie WilliamsSystem and method for interfacing with heterogeneous network data gathering tools
US20050015622A1 (en)*2003-02-142005-01-20Williams John LeslieSystem and method for automated policy audit and remediation management
US7711803B2 (en)*2003-04-042010-05-04Computer Associates Think, Inc.Method and system for management and configuration of remote agents
US20050114397A1 (en)*2003-04-042005-05-26Computer Associates Think, Inc.Method and system for management and configuration of remote agents
US7489645B2 (en)2003-12-172009-02-10Microsoft CorporationMesh networks with end device recognition
US7665126B2 (en)*2003-12-172010-02-16Microsoft CorporationMesh networks with exclusion capability
US20050138359A1 (en)*2003-12-172005-06-23Simon Daniel R.Mesh networks with exclusion capability
US20050135268A1 (en)*2003-12-172005-06-23Simon Daniel R.Mesh networks with end device recognition
US20050154719A1 (en)*2004-01-092005-07-14International Business Machines CorporationSearch and query operations in a dynamic composition of help information for an aggregation of applications
US7890864B2 (en)2004-01-092011-02-15International Business Machines CorporationDynamic composition of help information for an aggregation of applications
US20050154986A1 (en)*2004-01-092005-07-14International Business Machines CorporationDynamic composition of help information for an aggregation of applications
US7783638B2 (en)2004-01-092010-08-24International Business Machines CorporationSearch and query operations in a dynamic composition of help information for an aggregation of applications
US7930696B2 (en)2004-03-052011-04-19International Business Machines CorporationFederating legacy/remote content into a central network console
US8140976B2 (en)2004-03-052012-03-20International Business Machines CorporationUsing content aggregation to build administration consoles
US20080270929A1 (en)*2004-03-052008-10-30International Business Machines CorporationFederating Legacy/Remote Content into a Central Network Console
US20090044152A1 (en)*2004-03-052009-02-12International Business Machines CorporationUsing content aggregation to build administration consoles
US8201257B1 (en)2004-03-312012-06-12Mcafee, Inc.System and method of managing network security risks
US8327290B2 (en)2004-04-062012-12-04International Business Machines CorporationUser task interface in a web application
US20060031849A1 (en)*2004-04-062006-02-09International Business Machines CorporationUser task interface in a Web application
US7673334B2 (en)*2004-08-302010-03-02Kddi CorporationCommunication system and security assurance device
US20060048228A1 (en)*2004-08-302006-03-02Kddi Corporation; Keio UniversityCommunication system and security assurance device
US9294867B2 (en)*2005-01-142016-03-22Hewlett Packard Enterprise Development LpProvision of services over a common delivery platform such as a mobile telephony network
US20060161619A1 (en)*2005-01-142006-07-20I Anson ColinProvision of services over a common delivery platform such as a mobile telephony network
US20060161616A1 (en)*2005-01-142006-07-20I Anson ColinProvision of services over a common delivery platform such as a mobile telephony network
US20060161991A1 (en)*2005-01-142006-07-20I Anson ColinProvision of services over a common delivery platform such as a mobile telephony network
US20150056963A1 (en)*2005-01-142015-02-26Hewlett-Packard Development Company, L.P.Provision of services over a common delivery platform such as a mobile telephony network
US8904000B2 (en)*2005-01-142014-12-02Hewlett-Packard Development Company, L.P.Provision of services over a common delivery platform such as a mobile telephony network
US8291077B2 (en)2005-01-142012-10-16Hewlett-Packard Development Company, L.P.Provision of services over a common delivery platform such as a mobile telephony network
US10552622B2 (en)*2005-02-182020-02-04Protegrity CorporationMulti-layer system for privacy enforcement and monitoring of suspicious data access behavior
US20150096049A1 (en)*2005-02-182015-04-02Protegrity CorporationMulti-layer system for privacy enforcement and monitoring of suspicious data access behavior
US20060215448A1 (en)*2005-03-282006-09-28Ellis Nigel RMapping of a file system model to a database object
US7478102B2 (en)*2005-03-282009-01-13Microsoft CorporationMapping of a file system model to a database object
US20080114709A1 (en)*2005-05-032008-05-15Dixon Christopher JSystem, method, and computer program product for presenting an indicia of risk associated with search results within a graphical user interface
US8161134B2 (en)*2005-09-202012-04-17Cisco Technology, Inc.Smart zoning to enforce interoperability matrix in a storage area network
US20070067589A1 (en)*2005-09-202007-03-22Cisco Technology, Inc.Smart zoning to enforce interoperability matrix in a storage area network
US9170999B2 (en)2006-02-212015-10-27International Business Machines CorporationMethod, system, and program product for transferring document attributes
US20070198555A1 (en)*2006-02-212007-08-23International Business Machines CorporationMethod, system, and program product for transferring document attributes
US8903763B2 (en)*2006-02-212014-12-02International Business Machines CorporationMethod, system, and program product for transferring document attributes
US8520503B2 (en)2006-03-032013-08-27The Boeing CompanySupporting application effectiveness in a network environment
US20070206511A1 (en)*2006-03-032007-09-06The Boeing CompanyCapability-based testing and evaluation of network performance
US7969879B2 (en)*2006-03-032011-06-28The Boeing CompanySupporting network self-healing and optimization
US7894357B2 (en)*2006-03-032011-02-22The Boeing CompanyCapability-based testing and evaluation of network performance
US20110004686A1 (en)*2006-03-032011-01-06The Boeing CompanySupporting application effectiveness in a network environment
US7817536B2 (en)*2006-03-032010-10-19The Boeing CompanySupporting application effectiveness in a network environment
US20070274337A1 (en)*2006-03-032007-11-29The Boeing CompanySupporting network self-healing and optimization
US20070297447A1 (en)*2006-03-032007-12-27The Boeing CompanySupporting application effectiveness in a network environment
US8347321B1 (en)*2006-03-302013-01-01Emc CorporationIn place object reconstruction
US10621611B2 (en)2006-07-272020-04-14Blackhawk Network, Inc.System and method for targeted marketing and consumer resource management
US10726439B2 (en)2006-07-272020-07-28Blackhawk Network, Inc.System and method for targeted marketing and consumer resource management
US11935089B2 (en)2006-07-272024-03-19Blackhawk Network, Inc.Enhanced rebate program
US11645669B2 (en)2006-07-272023-05-09Blackhawk Network, Inc.System and method for targeted marketing and consumer resource management
US11532010B2 (en)2006-07-272022-12-20Blackhawk Network, Inc.System and method for targeted marketing and consumer resource management
US11062342B2 (en)2006-07-272021-07-13Blackhawk Network, Inc.System and method for targeted marketing and consumer resource management
US10915917B2 (en)2006-07-272021-02-09Blackhawk Network, Inc.System and method for targeted marketing and consumer resource management
US10755298B2 (en)2006-07-272020-08-25Blackhawk Network, Inc.System and method for targeted marketing and consumer resource management
US10672022B2 (en)2006-07-272020-06-02Blackhawk Network, Inc.System and method for targeted marketing and consumer resource management
US10163121B2 (en)2006-07-272018-12-25Blackhawk Network, Inc.System and method for targeted marketing and consumer resource management
US9792619B2 (en)2006-07-272017-10-17Blackhawk Network, Inc.System and method for targeted marketing and consumer resource management
US9785961B2 (en)2006-07-272017-10-10Blackhawk Network, Inc.System and method for targeted marketing and consumer resource management
US20140006268A1 (en)*2006-07-272014-01-02Blackhawk Network, Inc.System and Method for Targeted Marketing and Consumer Resource Management
US8935380B2 (en)*2006-09-222015-01-13Oracle America, Inc.Automated product knowledge catalog
US20080077603A1 (en)*2006-09-222008-03-27Sun Microsystems, Inc.Automated product knowledge catalog
US8375360B2 (en)2006-11-222013-02-12Hewlett-Packard Development Company, L.P.Provision of services over a common delivery platform such as a mobile telephony network
US20080120599A1 (en)*2006-11-222008-05-22I Anson ColinProvision of services over a common delivery platform such as a mobile telephony network
US9077739B2 (en)*2006-11-282015-07-07Cisco Technology, Inc.Messaging security device
US8897579B2 (en)2006-11-292014-11-25Google Inc.Digital image archiving and retrieval
US7986843B2 (en)2006-11-292011-07-26Google Inc.Digital image archiving and retrieval in a mobile device system
US20080126415A1 (en)*2006-11-292008-05-29Google Inc.Digital Image Archiving and Retrieval in a Mobile Device System
US8620114B2 (en)2006-11-292013-12-31Google Inc.Digital image archiving and retrieval in a mobile device system
US20080162602A1 (en)*2006-12-282008-07-03Google Inc.Document archiving system
US20080162603A1 (en)*2006-12-282008-07-03Google Inc.Document archiving system
US20090319529A1 (en)*2008-06-202009-12-24Raytheon CompanyInformation Rights Management
US20100146593A1 (en)*2008-12-052010-06-10Raytheon CompanySecure Document Management
US8234693B2 (en)2008-12-052012-07-31Raytheon CompanySecure document management
US20120173497A1 (en)*2011-01-022012-07-05Cisco Technology, Inc.Defense-in-depth security for bytecode executables
US8694548B2 (en)*2011-01-022014-04-08Cisco Technology, Inc.Defense-in-depth security for bytecode executables
US9129286B2 (en)2011-04-122015-09-08Teletech Holdings, Inc.Methods for providing cross-vendor support services
AU2012242707B2 (en)*2011-04-122015-06-04Teletech Holdings, Inc.Methods for providing cross-vendor support services
US9178994B2 (en)2011-04-122015-11-03Teletech Holdings, Inc.Methods for providing self-support services using information from a viral source
US9081982B2 (en)2011-04-182015-07-14Raytheon CompanyAuthorized data access based on the rights of a user and a location
US20140281482A1 (en)*2013-03-152014-09-18Low Gravity Innovation, Inc.Secure storage and sharing of user objects
US9432344B2 (en)*2013-03-152016-08-30Low Gravity Innovation, Inc.Secure storage and sharing of user objects
US10547606B2 (en)*2016-07-222020-01-28Fuji Xerox Co., Ltd.Information processing apparatus, security system, and non-transitory computer readable medium
US20180026967A1 (en)*2016-07-222018-01-25Fuji Xerox Co., Ltd.Information processing apparatus, security system, and non-transitory computer readable medium
WO2018177720A1 (en)*2017-03-312018-10-04Siemens Mobility GmbHMethod for controlling access of an electronic device to a system and security device
US11212256B2 (en)*2017-08-172021-12-28Texas Instruments IncorporatedFlexible hybrid firewall architecture
US10560428B2 (en)*2017-08-172020-02-11Texas Instruments IncorporatedFlexible hybrid firewall architecture
CN109981531A (en)*2017-12-272019-07-05航天信息股份有限公司A kind of tax outer net safety access method and system based on tax digital certificate
US20240137362A1 (en)*2018-06-082024-04-25Wells Fargo Bank, N.A.Two-way authentication system and method
US11094431B2 (en)2019-03-192021-08-17Global Broadband Solutions, LLCMethods and systems for securely accessing and managing aggregated submarine cable system information
US11676740B2 (en)2019-03-192023-06-13Global Broadband Solutions, LLCMethods and systems for securely accessing and managing aggregated submarine cable system information
US10510465B1 (en)*2019-03-192019-12-17Global Broadband Solutions, LLCMethods and systems for securely accessing and managing aggregated submarine cable system information
US20210377240A1 (en)*2020-06-022021-12-02FLEX Integration LLCSystem and methods for tokenized hierarchical secured asset distribution
US12149516B2 (en)*2020-06-022024-11-19Flex Integration, LLCSystem and methods for tokenized hierarchical secured asset distribution

Also Published As

Publication numberPublication date
US20070174627A1 (en)2007-07-26
AU2001279279A1 (en)2002-01-14
US7921289B2 (en)2011-04-05
WO2002003180A3 (en)2002-06-20
US20070204336A1 (en)2007-08-30
WO2002003180A2 (en)2002-01-10

Similar Documents

PublicationPublication DateTitle
US7921289B2 (en)Secure compartmented mode knowledge management portal
USRE47443E1 (en)Document security system that permits external users to gain access to secured files
OppligerSecurity technologies for the world wide web
US6088451A (en)Security system and method for network element access
US7900240B2 (en)Multilayer access control security system
Singhal et al.Guide to secure web services
US9043589B2 (en)System and method for safeguarding and processing confidential information
US20140109179A1 (en)Multiple server access management
US20070101400A1 (en)Method of providing secure access to computer resources
US20040199768A1 (en)System and method for enabling enterprise application security
US20030177376A1 (en)Framework for maintaining information security in computer networks
WO2007048251A1 (en)Method of providing secure access to computer resources
US8805741B2 (en)Classification-based digital rights management
Linkies et al.SAP security and risk management
Dridi et al.Managing Security in the World Wide Web: Architecture, Services and Techniques
Singhal et al.SP 800-95. Guide to Secure Web Services
BuiSingle sign-on solution for MYSEA services
Vemulapalli et al.Security in distributed digital libraries: Issues and challenges
Hepner et al.Forming a Security Certification Enclave for Service-Oriented Architectures
Shaikh et al.Comparative analysis and design philosophy of next generation unified enterprise application security
Server et al.Building Secure ASP .NET Applications
Fleischer et al.Information Assurance for Global Information Grid (GIG) Net-Centric Enterprise Services
PriceAccess control systems and methodology
Perroud et al.Infrastructure Patterns
McGhieWeb Services: Security

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:RAYTHEON COMPANY, MASSACHUSETTS

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:TEIJIDO, DANIEL (NMI);SILCOX, JOSEPH M.;MOEHL, ROBERT C.;AND OTHERS;REEL/FRAME:015940/0441

Effective date:20010328

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp