Movatterモバイル変換


[0]ホーム

URL:


US20060236408A1 - Method and apparatus for device dependent access control for device independent web content - Google Patents

Method and apparatus for device dependent access control for device independent web content
Download PDF

Info

Publication number
US20060236408A1
US20060236408A1US11/105,612US10561205AUS2006236408A1US 20060236408 A1US20060236408 A1US 20060236408A1US 10561205 AUS10561205 AUS 10561205AUS 2006236408 A1US2006236408 A1US 2006236408A1
Authority
US
United States
Prior art keywords
resource
user
user device
access
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/105,612
Inventor
Shunguo Yan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines CorpfiledCriticalInternational Business Machines Corp
Priority to US11/105,612priorityCriticalpatent/US20060236408A1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATIONreassignmentINTERNATIONAL BUSINESS MACHINES CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: YAN, SHUNGUO
Publication of US20060236408A1publicationCriticalpatent/US20060236408A1/en
Priority to US12/135,436prioritypatent/US7657946B2/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A method, an apparatus, and computer instructions are provided for device-dependent access control for device independent web content. In an illustrative embodiment, a module may be implemented in a computer program detects a client device and security level from a request for a resource by a client device. The module loads, from a data source or configuration file, a three-dimensional device dependent access control matrix, which includes a user role axis, a device axis, and a resource axis. Based on the security level of the device indicated by the device matrix, the module grants or denies access to the resource by the user device. The security levels may include security protocols implemented by different devices, encryption schemes implemented by different devices, and security patches applied by the same device.

Description

Claims (20)

US11/105,6122005-04-142005-04-14Method and apparatus for device dependent access control for device independent web contentAbandonedUS20060236408A1 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US11/105,612US20060236408A1 (en)2005-04-142005-04-14Method and apparatus for device dependent access control for device independent web content
US12/135,436US7657946B2 (en)2005-04-142008-06-09Method for device dependent access control for device independent web content

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US11/105,612US20060236408A1 (en)2005-04-142005-04-14Method and apparatus for device dependent access control for device independent web content

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US12/135,436ContinuationUS7657946B2 (en)2005-04-142008-06-09Method for device dependent access control for device independent web content

Publications (1)

Publication NumberPublication Date
US20060236408A1true US20060236408A1 (en)2006-10-19

Family

ID=37110135

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US11/105,612AbandonedUS20060236408A1 (en)2005-04-142005-04-14Method and apparatus for device dependent access control for device independent web content
US12/135,436Expired - Fee RelatedUS7657946B2 (en)2005-04-142008-06-09Method for device dependent access control for device independent web content

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US12/135,436Expired - Fee RelatedUS7657946B2 (en)2005-04-142008-06-09Method for device dependent access control for device independent web content

Country Status (1)

CountryLink
US (2)US20060236408A1 (en)

Cited By (65)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20060021007A1 (en)*2004-07-212006-01-26Rensin David KSystem and method for lost data destruction of electronic data stored on portable electronic devices
US20060021006A1 (en)*2004-07-212006-01-26Rensin David KSystem and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall
US20060265733A1 (en)*2005-05-232006-11-23Xuemin ChenMethod and apparatus for security policy and enforcing mechanism for a set-top box security processor
US20070143848A1 (en)*2005-12-162007-06-21Kraemer Jeffrey AMethods and apparatus providing computer and network security for polymorphic attacks
US20070143847A1 (en)*2005-12-162007-06-21Kraemer Jeffrey AMethods and apparatus providing automatic signature generation and enforcement
US20070156650A1 (en)*2005-12-302007-07-05Becker Wolfgang ASystems and methods for accessing a shared space in a provider-tenant environment
US20070156848A1 (en)*2005-12-302007-07-05Wolfgang BeckerSoftware management systems and methods, including use of such systems and methods in a provider-tenant environment
US20070156806A1 (en)*2005-12-302007-07-05Becker Wolfgang ASystems and methods for deploying a tenant in a provider-tenant environment
US20070156901A1 (en)*2005-12-302007-07-05Wolfgang BeckerGeneration and use of table links in a provider-tenant environment
US20070156849A1 (en)*2005-12-302007-07-05Wolfgang BeckerSystems and methods for delivering software upgrades in a provider-tenant environment
US20070156902A1 (en)*2005-12-302007-07-05Becker Wolfgang ASystems and methods for implementing a tenant space in a provider-tenant environment
US20070162452A1 (en)*2005-12-302007-07-12Becker Wolfgang ASystems and methods for implementing a shared space in a provider-tenant environment
US20070162969A1 (en)*2005-12-302007-07-12Becker Wolfgang AProvider-tenant systems, and methods for using the same
US20070180491A1 (en)*2006-01-272007-08-02Microsoft CorporationAuthorization scheme to simplify security configurations
US20070256127A1 (en)*2005-12-162007-11-01Kraemer Jeffrey AMethods and apparatus providing computer and network security utilizing probabilistic signature generation
US20080162660A1 (en)*2006-12-292008-07-03Becker Wolfgang ASystems and methods for accessing a shared space in a provider-tenant environment by using middleware
US20080162490A1 (en)*2006-12-292008-07-03Becker Wolfgang AMethods and systems for automatic registration during deployment of a tenant
US20080162536A1 (en)*2006-12-292008-07-03Becker Wolfgang ASystems and methods for extending shared data structures with tenant content in a provider-tenant environment
US20080162483A1 (en)*2006-12-292008-07-03Becker Wolfgang AMethods and systems for protecting shared tables against unauthorized overwriting from a tenant space in a mega-tenancy environment
US20080242405A1 (en)*2007-03-302008-10-02Microsoft CorporationOn-line gaming authentication
US20090119743A1 (en)*2007-11-072009-05-07Mcafee, Inc.Method and system for generic real time management of devices on computers connected to a network
US20090300718A1 (en)*2004-07-212009-12-03Beachhead Solutions, Inc.System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall
US7680825B2 (en)2005-12-302010-03-16Sap AgSystems and methods for generating tenant-specific properties for use in a provider-tenant environment
US20100107213A1 (en)*2008-10-232010-04-29Microsoft CorporationAccess Control State Determination Based on Security Policy and Secondary Access Control State
US20100242111A1 (en)*2005-12-162010-09-23Kraemer Jeffrey AMethods and apparatus providing computer and network security utilizing probabilistic policy reposturing
US20110072490A1 (en)*2005-05-232011-03-24Broadcom CorporationMethod and apparatus for constructing an accss control matrix for a set-top box security
US7933869B2 (en)2006-12-292011-04-26Sap AgMethod and system for cloning a tenant database in a multi-tenant system
US20110153576A1 (en)*2009-12-222011-06-23Daniel FigusMulti-Client Generic Persistence for Extension Fields
US8069184B2 (en)2006-12-292011-11-29Sap AgSystems and methods to implement extensibility of tenant content in a provider-tenant environment
US20110321154A1 (en)*2010-06-252011-12-29Sap AgSystems and methods for generating constraints for use in access control
US20120005387A1 (en)*2010-06-302012-01-05Sedayao Jeffrey CInterrupt blocker
US8185933B1 (en)*2006-02-022012-05-22Juniper Networks, Inc.Local caching of endpoint security information
US20130031120A1 (en)*2011-07-252013-01-31Luca PassaniSystem and Method for using a Device Description Repository
WO2013147757A1 (en)*2012-03-282013-10-03Intel CorporationConditional limited service grant based on device verification
US20130290851A1 (en)*2012-04-302013-10-31Microsoft CorporationUser interface web services
CN103634271A (en)*2012-08-212014-03-12腾讯科技(深圳)有限公司An authority control system, an apparatus and an authority control method for a network request
US8892495B2 (en)1991-12-232014-11-18Blanding Hovenweep, LlcAdaptive pattern recognition based controller apparatus and method and human-interface therefore
US20150178516A1 (en)*2013-12-232015-06-25Dropbox, Inc.Restricting access to content
US9177176B2 (en)2006-02-272015-11-03Broadcom CorporationMethod and system for secure system-on-a-chip architecture for multimedia data processing
US9489318B2 (en)2006-06-192016-11-08Broadcom CorporationMethod and system for accessing protected memory
US9535563B2 (en)1999-02-012017-01-03Blanding Hovenweep, LlcInternet appliance system and method
US9652637B2 (en)2005-05-232017-05-16Avago Technologies General Ip (Singapore) Pte. Ltd.Method and system for allowing no code download in a code download scheme
US9904809B2 (en)2006-02-272018-02-27Avago Technologies General Ip (Singapore) Pte. Ltd.Method and system for multi-level security initialization and configuration
US10397852B2 (en)*2014-02-122019-08-27Alcatel LucentMethod for access resource management of mobile transceiver by base station transceiver and apparatus associated therewith
CN110192197A (en)*2017-01-122019-08-30霍尼韦尔国际公司Identity is established by using certificate and trusts the technology to realize the guarantee of certified products equipment
US11050817B2 (en)2006-09-072021-06-29Rateze Remote Mgmt LlcVoice operated control device
US11204952B2 (en)*2012-12-282021-12-21Microsoft Technology Licensing, LlcDetecting anomalies in behavioral network with contextual side information
US11323771B2 (en)*2006-09-072022-05-03Rateze Remote Mgmt LlcVoice operated remote control
US20220206961A1 (en)*2020-12-282022-06-30Lempel MordkhaiArchitecture, system and methods thereof for secure computing using hardware security classifications
US11611573B1 (en)2021-09-202023-03-21Normalyze, Inc.In-cloud and constant time scanners
US20230094856A1 (en)*2021-09-202023-03-30Normalyze, Inc.Compact cloud access network based on role-to-resource detection with resource state change tracking and provenance
US20230198962A1 (en)*2019-12-102023-06-22Winkk, IncMethod and apparatus for secure application framework and platform
US12010511B2 (en)2019-12-102024-06-11Winkk, Inc.Method and apparatus for encryption key exchange with enhanced security through opti-encryption channel
US12058127B2 (en)2019-12-102024-08-06Winkk, Inc.Security platform architecture
US12067107B2 (en)2019-12-102024-08-20Winkk, Inc.Device handoff identification proofing using behavioral analytics
US12073378B2 (en)2019-12-102024-08-27Winkk, Inc.Method and apparatus for electronic transactions using personal computing devices and proxy services
US12095751B2 (en)2021-06-042024-09-17Winkk, Inc.Encryption for one-way data stream
US12132763B2 (en)2019-12-102024-10-29Winkk, Inc.Bus for aggregated trust framework
US12143419B2 (en)2019-12-102024-11-12Winkk, Inc.Aggregated trust framework
US12153678B2 (en)2019-12-102024-11-26Winkk, Inc.Analytics with shared traits
US12184762B2 (en)2022-06-272024-12-31Xerox CorporationRemovable trusted platform module
US12206763B2 (en)2018-07-162025-01-21Winkk, Inc.Secret material exchange and authentication cryptography operations
US12284512B2 (en)2021-06-042025-04-22Winkk, Inc.Dynamic key exchange for moving target
US12335399B2 (en)2019-12-102025-06-17Winkk, Inc.User as a password
US12341790B2 (en)2019-12-102025-06-24Winkk, Inc.Device behavior analytics

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7536548B1 (en)*2002-06-042009-05-19Rockwell Automation Technologies, Inc.System and methodology providing multi-tier-security for network data exchange with industrial control components
US8327456B2 (en)*2007-04-132012-12-04Microsoft CorporationMultiple entity authorization model
US9430660B2 (en)*2008-01-312016-08-30International Business Machines CorporationManaging access in one or more computing systems
US9602971B2 (en)*2010-04-142017-03-21Nokia Technologies OyControlling dynamically-changing traffic load of whitespace devices for database access
WO2012039178A1 (en)2010-09-222012-03-29インターナショナル・ビジネス・マシーンズ・コーポレーションData distribution device, data distribution system, client device, data distribution method, data reception method, program and recording medium
US20120303533A1 (en)*2011-05-262012-11-29Michael Collins PinkusSystem and method for securing, distributing and enforcing for-hire vehicle operating parameters
US20130060721A1 (en)2011-09-022013-03-07Frias Transportation Infrastructure, LlcSystems and methods for pairing of for-hire vehicle meters and medallions
US9106650B2 (en)2011-11-092015-08-11Microsoft Technology Licensing, LlcUser-driven access control
US20130253999A1 (en)2012-03-222013-09-26Frias Transportation Infrastructure LlcTransaction and communication system and method for vendors and promoters
US9503478B2 (en)*2014-01-272016-11-22Honeywell International Inc.Policy-based secure communication with automatic key management for industrial control and automation systems
DE102014000963A1 (en)2014-01-232015-07-23Unify Gmbh & Co. Kg Method for handling security settings in a mobile terminal or for access control, mobile terminal, computer program, software product and digital storage medium
US9734309B1 (en)*2014-03-242017-08-15Amazon Technologies, Inc.Role-based access control assignment
US10038552B2 (en)2015-11-302018-07-31Honeywell International Inc.Embedded security architecture for process control systems
US10855462B2 (en)2016-06-142020-12-01Honeywell International Inc.Secure in-band upgrade using key revocation lists and certificate-less asymmetric tertiary key pairs
US10749692B2 (en)2017-05-052020-08-18Honeywell International Inc.Automated certificate enrollment for devices in industrial control systems or other systems
KR102690046B1 (en)*2023-11-152024-07-30에스지앤 주식회사A system that verifies user access to the central authorization server and manages access to internal resources

Citations (14)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6041412A (en)*1997-11-142000-03-21Tl Technology Rerearch (M) Sdn. Bhd.Apparatus and method for providing access to secured data or area
US6161139A (en)*1998-07-102000-12-12Encommerce, Inc.Administrative roles that govern access to administrative functions
US20020010679A1 (en)*2000-07-062002-01-24Felsher David PaulInformation record infrastructure, system and method
US6453353B1 (en)*1998-07-102002-09-17Entrust, Inc.Role-based navigation of information resources
US20020147801A1 (en)*2001-01-292002-10-10Gullotta Tony J.System and method for provisioning resources to users based on policies, roles, organizational information, and attributes
US20030037263A1 (en)*2001-08-082003-02-20Trivium Systems Inc.Dynamic rules-based secure data access system for business computer platforms
US20030219127A1 (en)*2002-05-242003-11-27Russ Samuel H.Apparatus for entitling remote client devices
US20030221012A1 (en)*2002-05-222003-11-27International Business Machines CorporationResource manager system and method for access control to physical resources in an application hosting environment
US20040019799A1 (en)*2001-12-202004-01-29Matthias VeringRole-based portal to a workplace system
US20040162906A1 (en)*2003-02-142004-08-19Griffin Philip B.System and method for hierarchical role-based entitlements
US20040162905A1 (en)*2003-02-142004-08-19Griffin Philip B.Method for role and resource policy management optimization
US20040162894A1 (en)*2003-02-142004-08-19Griffin Philip B.Method for role and resource policy management
US20050038688A1 (en)*2003-08-152005-02-17Collins Albert E.System and method for matching local buyers and sellers for the provision of community based services
US20060100912A1 (en)*2002-12-162006-05-11Questerra Llc.Real-time insurance policy underwriting and risk management

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20060008256A1 (en)*2003-10-012006-01-12Khedouri Robert KAudio visual player apparatus and system and method of content distribution using the same

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6041412A (en)*1997-11-142000-03-21Tl Technology Rerearch (M) Sdn. Bhd.Apparatus and method for providing access to secured data or area
US6161139A (en)*1998-07-102000-12-12Encommerce, Inc.Administrative roles that govern access to administrative functions
US6182142B1 (en)*1998-07-102001-01-30Encommerce, Inc.Distributed access management of information resources
US6453353B1 (en)*1998-07-102002-09-17Entrust, Inc.Role-based navigation of information resources
US20020010679A1 (en)*2000-07-062002-01-24Felsher David PaulInformation record infrastructure, system and method
US20020147801A1 (en)*2001-01-292002-10-10Gullotta Tony J.System and method for provisioning resources to users based on policies, roles, organizational information, and attributes
US20030037263A1 (en)*2001-08-082003-02-20Trivium Systems Inc.Dynamic rules-based secure data access system for business computer platforms
US20040019799A1 (en)*2001-12-202004-01-29Matthias VeringRole-based portal to a workplace system
US20030221012A1 (en)*2002-05-222003-11-27International Business Machines CorporationResource manager system and method for access control to physical resources in an application hosting environment
US20030219127A1 (en)*2002-05-242003-11-27Russ Samuel H.Apparatus for entitling remote client devices
US20060100912A1 (en)*2002-12-162006-05-11Questerra Llc.Real-time insurance policy underwriting and risk management
US20040162906A1 (en)*2003-02-142004-08-19Griffin Philip B.System and method for hierarchical role-based entitlements
US20040162905A1 (en)*2003-02-142004-08-19Griffin Philip B.Method for role and resource policy management optimization
US20040162894A1 (en)*2003-02-142004-08-19Griffin Philip B.Method for role and resource policy management
US20050038688A1 (en)*2003-08-152005-02-17Collins Albert E.System and method for matching local buyers and sellers for the provision of community based services

Cited By (115)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8892495B2 (en)1991-12-232014-11-18Blanding Hovenweep, LlcAdaptive pattern recognition based controller apparatus and method and human-interface therefore
US9535563B2 (en)1999-02-012017-01-03Blanding Hovenweep, LlcInternet appliance system and method
US20060021007A1 (en)*2004-07-212006-01-26Rensin David KSystem and method for lost data destruction of electronic data stored on portable electronic devices
US20060021006A1 (en)*2004-07-212006-01-26Rensin David KSystem and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall
US8185735B2 (en)*2004-07-212012-05-22Beachead Solutions, Inc.System and method for lost data destruction of electronic data stored on portable electronic devices
US8037304B2 (en)*2004-07-212011-10-11Beachhead Solutions, Inc.System and method for lost data destruction of electronic data stored on portable electronic devices
US20110197258A1 (en)*2004-07-212011-08-11Beachhead Solutions, Inc.System and method for lost data destruction of electronic data stored on portable electronic devices
US20100115579A1 (en)*2004-07-212010-05-06Beachhead Solutions, Inc.System and method for lost data destruction of electronic data stored on portable electronic devices
US20090300718A1 (en)*2004-07-212009-12-03Beachhead Solutions, Inc.System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall
US7543144B2 (en)*2004-07-212009-06-02Beachhead SolutionsSystem and method for lost data destruction of electronic data stored on portable electronic devices
US7540016B2 (en)2004-07-212009-05-26Beachhead Solutions, Inc.System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall
US9449159B2 (en)2004-07-212016-09-20Beachhead Solutions, Inc.System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall
US20110072490A1 (en)*2005-05-232011-03-24Broadcom CorporationMethod and apparatus for constructing an accss control matrix for a set-top box security
US20060265733A1 (en)*2005-05-232006-11-23Xuemin ChenMethod and apparatus for security policy and enforcing mechanism for a set-top box security processor
US9652637B2 (en)2005-05-232017-05-16Avago Technologies General Ip (Singapore) Pte. Ltd.Method and system for allowing no code download in a code download scheme
US8347357B2 (en)2005-05-232013-01-01Broadcom CorporationMethod and apparatus for constructing an access control matrix for a set-top box security processor
US7913289B2 (en)*2005-05-232011-03-22Broadcom CorporationMethod and apparatus for security policy and enforcing mechanism for a set-top box security processor
US9286469B2 (en)2005-12-162016-03-15Cisco Technology, Inc.Methods and apparatus providing computer and network security utilizing probabilistic signature generation
US20070256127A1 (en)*2005-12-162007-11-01Kraemer Jeffrey AMethods and apparatus providing computer and network security utilizing probabilistic signature generation
US8255995B2 (en)2005-12-162012-08-28Cisco Technology, Inc.Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing
US8413245B2 (en)*2005-12-162013-04-02Cisco Technology, Inc.Methods and apparatus providing computer and network security for polymorphic attacks
US20070143848A1 (en)*2005-12-162007-06-21Kraemer Jeffrey AMethods and apparatus providing computer and network security for polymorphic attacks
US20070143847A1 (en)*2005-12-162007-06-21Kraemer Jeffrey AMethods and apparatus providing automatic signature generation and enforcement
US8495743B2 (en)2005-12-162013-07-23Cisco Technology, Inc.Methods and apparatus providing automatic signature generation and enforcement
US20100242111A1 (en)*2005-12-162010-09-23Kraemer Jeffrey AMethods and apparatus providing computer and network security utilizing probabilistic policy reposturing
US20070156849A1 (en)*2005-12-302007-07-05Wolfgang BeckerSystems and methods for delivering software upgrades in a provider-tenant environment
US20070156806A1 (en)*2005-12-302007-07-05Becker Wolfgang ASystems and methods for deploying a tenant in a provider-tenant environment
US7698284B2 (en)2005-12-302010-04-13Sap AgSystems and methods for deploying a tenant in a provider-tenant environment
US7689593B2 (en)2005-12-302010-03-30Sap AgSystems and methods for accessing a shared space in a provider-tenant environment
US20070156848A1 (en)*2005-12-302007-07-05Wolfgang BeckerSoftware management systems and methods, including use of such systems and methods in a provider-tenant environment
US20070162969A1 (en)*2005-12-302007-07-12Becker Wolfgang AProvider-tenant systems, and methods for using the same
US7680825B2 (en)2005-12-302010-03-16Sap AgSystems and methods for generating tenant-specific properties for use in a provider-tenant environment
US20070156902A1 (en)*2005-12-302007-07-05Becker Wolfgang ASystems and methods for implementing a tenant space in a provider-tenant environment
US20070162452A1 (en)*2005-12-302007-07-12Becker Wolfgang ASystems and methods for implementing a shared space in a provider-tenant environment
US7917607B2 (en)2005-12-302011-03-29Sap AgSoftware management systems and methods, including use of such systems and methods in a provider-tenant environment
US7930318B2 (en)2005-12-302011-04-19Sap AgSystems and methods for implementing a tenant space in a provider-tenant environment
US20070156650A1 (en)*2005-12-302007-07-05Becker Wolfgang ASystems and methods for accessing a shared space in a provider-tenant environment
US20070156901A1 (en)*2005-12-302007-07-05Wolfgang BeckerGeneration and use of table links in a provider-tenant environment
US7693851B2 (en)2005-12-302010-04-06Sap AgSystems and methods for implementing a shared space in a provider-tenant environment
US7992190B2 (en)*2006-01-272011-08-02Microsoft CorporationAuthorization scheme to simplify security configurations
US20070180491A1 (en)*2006-01-272007-08-02Microsoft CorporationAuthorization scheme to simplify security configurations
US8185933B1 (en)*2006-02-022012-05-22Juniper Networks, Inc.Local caching of endpoint security information
US9904809B2 (en)2006-02-272018-02-27Avago Technologies General Ip (Singapore) Pte. Ltd.Method and system for multi-level security initialization and configuration
US9177176B2 (en)2006-02-272015-11-03Broadcom CorporationMethod and system for secure system-on-a-chip architecture for multimedia data processing
US9489318B2 (en)2006-06-192016-11-08Broadcom CorporationMethod and system for accessing protected memory
US11570393B2 (en)2006-09-072023-01-31Rateze Remote Mgmt LlcVoice operated control device
US11729461B2 (en)2006-09-072023-08-15Rateze Remote Mgmt LlcAudio or visual output (A/V) devices registering with a wireless hub system
US11050817B2 (en)2006-09-072021-06-29Rateze Remote Mgmt LlcVoice operated control device
US11323771B2 (en)*2006-09-072022-05-03Rateze Remote Mgmt LlcVoice operated remote control
US11968420B2 (en)2006-09-072024-04-23Rateze Remote Mgmt LlcAudio or visual output (A/V) devices registering with a wireless hub system
US11451621B2 (en)2006-09-072022-09-20Rateze Remote Mgmt LlcVoice operated control device
US8069184B2 (en)2006-12-292011-11-29Sap AgSystems and methods to implement extensibility of tenant content in a provider-tenant environment
US7933869B2 (en)2006-12-292011-04-26Sap AgMethod and system for cloning a tenant database in a multi-tenant system
US20080162536A1 (en)*2006-12-292008-07-03Becker Wolfgang ASystems and methods for extending shared data structures with tenant content in a provider-tenant environment
US20080162483A1 (en)*2006-12-292008-07-03Becker Wolfgang AMethods and systems for protecting shared tables against unauthorized overwriting from a tenant space in a mega-tenancy environment
US20080162660A1 (en)*2006-12-292008-07-03Becker Wolfgang ASystems and methods for accessing a shared space in a provider-tenant environment by using middleware
US20080162490A1 (en)*2006-12-292008-07-03Becker Wolfgang AMethods and systems for automatic registration during deployment of a tenant
US7739348B2 (en)2006-12-292010-06-15Sap AgSystems and methods for accessing a shared space in a provider-tenant environment by using middleware
US20080242405A1 (en)*2007-03-302008-10-02Microsoft CorporationOn-line gaming authentication
US8484327B2 (en)*2007-11-072013-07-09Mcafee, Inc.Method and system for generic real time management of devices on computers connected to a network
US20090119743A1 (en)*2007-11-072009-05-07Mcafee, Inc.Method and system for generic real time management of devices on computers connected to a network
US8387109B2 (en)2008-10-232013-02-26Microsoft CorporationAccess control state determination based on security policy and secondary access control state
US20100107213A1 (en)*2008-10-232010-04-29Microsoft CorporationAccess Control State Determination Based on Security Policy and Secondary Access Control State
US8224828B2 (en)2009-12-222012-07-17Sap AgMulti-client generic persistence for extension fields
US8805864B2 (en)2009-12-222014-08-12Sap AgMulti-client generic persistence for extension fields
US20110153576A1 (en)*2009-12-222011-06-23Daniel FigusMulti-Client Generic Persistence for Extension Fields
US20110321154A1 (en)*2010-06-252011-12-29Sap AgSystems and methods for generating constraints for use in access control
US8381285B2 (en)*2010-06-252013-02-19Sap AgSystems and methods for generating constraints for use in access control
US20120005387A1 (en)*2010-06-302012-01-05Sedayao Jeffrey CInterrupt blocker
US9304956B2 (en)2010-06-302016-04-05Intel CorporationInterrupt blocker
US8549201B2 (en)*2010-06-302013-10-01Intel CorporationInterrupt blocker
US9058404B2 (en)2011-07-252015-06-16Scientiamobile, Inc.System and method for using a device description repository
US9547727B2 (en)*2011-07-252017-01-17Scientiamobile, Inc.System and method for using a device description repository
US20130031120A1 (en)*2011-07-252013-01-31Luca PassaniSystem and Method for using a Device Description Repository
KR101699874B1 (en)2012-03-282017-01-25인텔 코포레이션Conditional limited service grant based on device verification
KR20160119265A (en)*2012-03-282016-10-12인텔 코포레이션Conditional limited service grant based on device verification
US9338656B2 (en)*2012-03-282016-05-10Intel CorporationConditional limited service grant based on device verification
WO2013147757A1 (en)*2012-03-282013-10-03Intel CorporationConditional limited service grant based on device verification
US20130337777A1 (en)*2012-03-282013-12-19Steven W. DeutschConditional limited service grant based on device verification
US20130290851A1 (en)*2012-04-302013-10-31Microsoft CorporationUser interface web services
CN103634271A (en)*2012-08-212014-03-12腾讯科技(深圳)有限公司An authority control system, an apparatus and an authority control method for a network request
US11204952B2 (en)*2012-12-282021-12-21Microsoft Technology Licensing, LlcDetecting anomalies in behavioral network with contextual side information
US11372990B2 (en)2013-12-232022-06-28Dropbox, Inc.Restricting access to content
US20150178516A1 (en)*2013-12-232015-06-25Dropbox, Inc.Restricting access to content
US9817987B2 (en)*2013-12-232017-11-14Dropbox, Inc.Restricting access to content
US10397852B2 (en)*2014-02-122019-08-27Alcatel LucentMethod for access resource management of mobile transceiver by base station transceiver and apparatus associated therewith
CN110192197A (en)*2017-01-122019-08-30霍尼韦尔国际公司Identity is established by using certificate and trusts the technology to realize the guarantee of certified products equipment
US12206763B2 (en)2018-07-162025-01-21Winkk, Inc.Secret material exchange and authentication cryptography operations
US12058127B2 (en)2019-12-102024-08-06Winkk, Inc.Security platform architecture
US12143419B2 (en)2019-12-102024-11-12Winkk, Inc.Aggregated trust framework
US20230198962A1 (en)*2019-12-102023-06-22Winkk, IncMethod and apparatus for secure application framework and platform
US12132763B2 (en)2019-12-102024-10-29Winkk, Inc.Bus for aggregated trust framework
US12073378B2 (en)2019-12-102024-08-27Winkk, Inc.Method and apparatus for electronic transactions using personal computing devices and proxy services
US12335399B2 (en)2019-12-102025-06-17Winkk, Inc.User as a password
US12155637B2 (en)*2019-12-102024-11-26Winkk, Inc.Method and apparatus for secure application framework and platform
US12153678B2 (en)2019-12-102024-11-26Winkk, Inc.Analytics with shared traits
US12341790B2 (en)2019-12-102025-06-24Winkk, Inc.Device behavior analytics
US12010511B2 (en)2019-12-102024-06-11Winkk, Inc.Method and apparatus for encryption key exchange with enhanced security through opti-encryption channel
US12212959B2 (en)2019-12-102025-01-28Winkk, Inc.Method and apparatus for encryption key exchange with enhanced security through opti-encryption channel
US12067107B2 (en)2019-12-102024-08-20Winkk, Inc.Device handoff identification proofing using behavioral analytics
US20220206961A1 (en)*2020-12-282022-06-30Lempel MordkhaiArchitecture, system and methods thereof for secure computing using hardware security classifications
US12135657B2 (en)*2020-12-282024-11-05Lempel MordkhaiArchitecture, system and methods thereof for secure computing using hardware security classifications
US12284512B2 (en)2021-06-042025-04-22Winkk, Inc.Dynamic key exchange for moving target
US12095751B2 (en)2021-06-042024-09-17Winkk, Inc.Encryption for one-way data stream
US11695785B2 (en)2021-09-202023-07-04Normalyze, Inc.Cloud environment analytics using snapshotting
US11943241B2 (en)2021-09-202024-03-26Normalyze, Inc.Compact cloud access network based on role-to-resource detection with resource state change tracking and provenance
US11943240B2 (en)2021-09-202024-03-26Normalyze, Inc.Cloud data attack detection based on network vulnerability signatures in traced resource network paths
US12166775B2 (en)2021-09-202024-12-10Normalyze, Inc.Graphical query builder for cloud data attack detection
US11876813B2 (en)2021-09-202024-01-16Normalyze, Inc.Cloud data schema detection system
US11627155B1 (en)2021-09-202023-04-11Normalyze, Inc.Cloud infrastructure detection with resource path tracing
US11625499B1 (en)2021-09-202023-04-11Normalyze ,Inc.Cloud data attack detection query builder
US12335281B2 (en)2021-09-202025-06-17Normalyze, Inc.Cloud data security posture detection based on network communication paths and sensitivity data
US20230094856A1 (en)*2021-09-202023-03-30Normalyze, Inc.Compact cloud access network based on role-to-resource detection with resource state change tracking and provenance
US11611573B1 (en)2021-09-202023-03-21Normalyze, Inc.In-cloud and constant time scanners
US12184762B2 (en)2022-06-272024-12-31Xerox CorporationRemovable trusted platform module

Also Published As

Publication numberPublication date
US20080235811A1 (en)2008-09-25
US7657946B2 (en)2010-02-02

Similar Documents

PublicationPublication DateTitle
US7657946B2 (en)Method for device dependent access control for device independent web content
Ramesh et al.The Performance Evolution of Antivirus Security Systems in Ultra dense Cloud Server Using Intelligent Deep Learning
US9032318B2 (en)Widget security
US11272030B2 (en)Dynamic runtime interface for device management
US8041955B2 (en)Grid mutual authorization through proxy certificate generation
CN109196505B (en)Hardware-based virtualized security isolation
US20080163339A1 (en)Dynamic Security Access
EP4309062A1 (en)Cybersecurity system
US9501628B2 (en)Generating a distrubition package having an access control execution program for implementing an access control mechanism and loading unit for a client
US10757079B2 (en)Method and system for controlling remote session on computer systems using a virtual channel
US8667578B2 (en)Web management authorization and delegation framework
US20070101435A1 (en)System and Methodology Providing Secure Workspace Environment
US8805972B1 (en)Multi-platform operational objective configurator for computing devices
KR101150128B1 (en)Method and system for merging security policies
US20100175113A1 (en)Secure System Access Without Password Sharing
JP2010026662A (en)Information leakage prevention system
US7178165B2 (en)Additional layer in operating system to protect system from hacking
US7996674B2 (en)LDAP user authentication
US9081720B2 (en)Information processing apparatus, setting information management method and recording medium
US9843603B2 (en)Techniques for dynamic access control of input/output devices
WO2003032158A2 (en)System and method for specifying access to resources in a mobile code system
US7950000B2 (en)Architecture that restricts permissions granted to a build process
US11716355B1 (en)Company controlled virtual computer over a network
US20220215095A1 (en)Detecting and Preventing Installation and Execution of Malicious Browser Extensions
US12346446B2 (en)Detecting and preventing installation and execution of malicious browser extensions

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:YAN, SHUNGUO;REEL/FRAME:016416/0353

Effective date:20050406

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO PAY ISSUE FEE


[8]ページ先頭

©2009-2025 Movatter.jp