Match Document Document Title
US20120011560 Dynamic Policy Trees for Matching Policies  
A system and method is provided for evaluating one or more security policies. Security policies may be analyzed to determine one or more policy attributes based on which one or more policy trees...
US20150113589 AUTHENTICATION SERVER ENHANCEMENTS  
A set of authentication server configuration rules are implemented. The authentication server configuration rules utilize regular-expression based commands. A running log of commands entered by...
US20140020046 SOURCE CODE ANALYSIS OF INTER-RELATED CODE BASES  
A method and system for analyzing source code is disclosed. A computer identifies a call in a first source code to an application programming interface in a second source code. Responsive to...
US20110030029 REMOTE MANAGEMENT AND NETWORK ACCESS CONTROL OF PRINTING DEVICES WITHIN SECURE NETWORKS  
Systems and methods are disclosed for enabling remote management of printing devices and for providing access control of printing devices within secure health policy based networks. A printing...
US20100325569 SECURITY POLICY VERIFICATION SYSTEM  
Systems and methods are provided that comprise a security policy verification system for verifying security policies. The system parses programming language code that implements security policies,...
US20130247140 METHOD OF PROTECTING AN INDIVIDUAL'S PRIVACY WHEN PROVIDING SERVICE BASED ON ELECTRONIC TAG  
A technology for providing a service based on an electronic tag. A personalized service provider issues a new code that replaces a code recorded on an electronic tag which is attached to a product...
US20140033270 SYSTEM AND METHOD FOR PROVIDING CUSTOMIZED RESPONSE MESSAGES BASED ON REQUESTED WEBSITE  
The invention describes a system, method and computer product to regulate user access to websites. The system receives a URL request by a user corresponding to a website that the user wishes to...
US20140317677 FRAMEWORK FOR COORDINATION BETWEEN ENDPOINT SECURITY AND NETWORK SECURITY SERVICES  
Systems and techniques are described for virtual machine security. A described technique includes operating one or more virtual machines each in accordance with a respective security container,...
US20140344888 NETWORK SECURITY APPARATUS AND METHOD  
A network security apparatus includes a management unit, a security policies monitoring unit, a security monitoring unit, a log security check unit, and a log transmission unit. The management...
US20140282854 SYSTEM AND METHOD FOR MODELING A NETWORKING DEVICE POLICY  
Implementations of the present disclosure involve a system and/or method for modeling a networking device policy or set of rules and/or transforming a networking device policy model into a set of...
US20150261961 SCENARIO-BASED SECURITY METHOD AND SYSTEM  
A scenario-based security method and system are provided. The scenario-based security method includes a) establishing a correspondence table, the correspondence table records an account related to...
US20130086625 ENFORCING SECURITY RULES AT RUNTIME  
Various arrangements for implementing a security policy at runtime are presented. A plurality of calls in a syntax tree may be identified. Each call of the plurality of calls may be substituted...
US20150046972 RETROSPECTIVE POLICY SAFETY NET  
These and other objectives are attained with a method and system for evaluating an access policy change. The method comprises the step of providing an access control mechanism having a first...
US20130205368 RETROSPECTIVE POLICY SAFETY NET  
These and other objectives are attained with a method and system for evaluating an access policy change. The method comprises the step of providing an access control mechanism having a first...
US20140380408 Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions and rights management  
An integrated, modular array of administrative and support services are provided for electronic commerce and electronic rights and transaction management. These administrative and support services...
US20110078759 Method and System For Automating Security Policy Definition Based On Recorded Transactions  
Following development of an application, the application is deployed in a pre-production environment. A user role plays against that application, typically by performing one or more operations as...
US20150067763 HARDWARE AND SOFTWARE EXECUTION PROFILING  
Technologies for assembling an execution profile of an event are disclosed. The technologies may include monitoring the event for a branch instruction, generating a callback to a security module...
US20150101010 MALICIOUS CODE INFECTION CAUSE-AND-EFFECT ANALYSIS  
A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer system activities. Upon being...
US20120137342 MALICIOUS CODE INFECTION CAUSE-AND-EFFECT ANALYSIS  
A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer system activities. Upon being...
US20140157350 ROLE-BASED ACCESS CONTROL MODELING AND AUDITING SYSTEM  
A role-based access control (RBAC) modeling and auditing system is described that enables a user to access and/or create security roles that can be applied to users of a first software...
US20140068697 STATIC ENFORCEMENT OF PROCESS-LEVEL SECURITY AND COMPLIANCE SPECIFICATIONS FOR CLOUD-BASED SYSTEMS  
Implementations of the present disclosure are directed to statically checking conformance of a computer-implemented service at a source code level to requirements specified at a process level and...
US20130007836 METHOD AND SYSTEM FOR PROVIDING INFORMATION FROM THIRD PARTY APPLICATIONS TO DEVICES  
A method and system of making information from an application accessible to an electronic device, comprising: checking, via a log monitor, a third party log file for a new log entry; sending any...
US20120072968 ASSESSMENT AND ANALYSIS OF SOFTWARE SECURITY FLAWS IN VIRTUAL MACHINES  
Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software...
US20140282853 MOBILE INFORMATION MANAGEMENT METHODS AND SYSTEMS  
A system and method are disclosed for mobile information management using a code injection approach. The method for information management of applications includes the steps of: receiving, by a...
US20140143828 METHODS AND SYSTEMS FOR ENABLING COMMUNITY-TESTED SECURITY FEATURES FOR LEGACY APPLICATIONS  
A computer-implemented method for enabling community-tested security features for legacy applications may include: 1) identifying a plurality of client systems, 2) identifying a legacy application...
US20140282861 SYSTEM AND METHOD FOR ADAPTING AN INTERNET FILTER  
A system and method for updating a filtering system which controls access to a website/page between a local area network (LAN) and an Internet. The LAN includes an Internet gateway system coupled...
US20120096514 AGE VERIFICATION AND CONTENT FILTERING SYSTEMS AND METHODS  
A system and method is provided for age verification and content filtering (AV/CF) on a wireless telecommunications system capable of providing enhanced products such as Internet, WAP, messaging,...
US20140237542 REMEDIAL ACTION AGAINST MALICIOUS CODE AT A CLIENT FACILITY  
Aspects of this invention may relate to a malicious application remedial action request application where a network site interaction may be requested from a client computing facility; the network...
US20140123216 METHOD OF GENERATING SECURITY RULE-SET AND SYSTEM THEREOF  
There are provided a method of generation of a security rule-set and a system thereof. The method includes: obtaining a group of log records of communication events resulting from traffic related...
US20120180104 METHOD OF GENERATING SECURITY RULE-SET AND SYSTEM THEREOF  
There are provided a method of automated generation of a security rule-set and a system thereof. The method comprises: obtaining a group of log records of communication events resulting from...
US20130047196 TRANSITIVE CLOSURE SECURITY  
In one implementation, a plurality of records included in a transitive closure of a driving record is identified, and a record from the plurality of records or the driving record is determined to...
US20140165139 Security Language Translations with Logic Resolution  
Security language constructs may be translated into logic language constructs and vice versa. Logic resolution may be effected using, for example, the logic language constructs. In an example...
US20110047381 SAFEMASHUPS CLOUD TRUST BROKER  
The present invention provides a new method for policy enforcement in a virtualized or cloud environment. We break down the environment into layers, which are further sub-divided into security...
US20120017263 Security Authorization Queries  
In an example implementation, a bifurcated security scheme has a first level that does not allow usage of negations and a second level that does permit usage of negations. In another example...
US20150169865 FILTERING MECHANISM FOR SECURING LINUX KERNEL  
Systems and methods for providing security to the Linux kernel are described. Wrappers are provided around the kernel, thereby reducing the amount of testing needed since the new security code...
US20140029039 OFFICE MACHINE SECURITY POLICY  
An example system can comprise a memory to store machine readable instructions. The system can also comprise a processing unit to execute the machine readable instructions. The machine readable...
US20120117612 SYSTEM AND/OR METHOD FOR AUTHENTICATION AND/OR AUTHORIZATION  
A computing platform constructs an application from source code such that the application detects an attempt to access at least one secured entity of the application. Further, the at least one...
US20150058627 DATA DRIVEN SCHEMA FOR PATIENT DATA EXCHANGE SYSTEM  
A patient data exchange system comprises at least one device. Each of the devices implements an interface. When a device in the patient data exchange system publishes patient data, the device...
US20110083081 SYSTEMS AND METHODS FOR ALLOWING A USER TO CONTROL THEIR COMPUTING ENVIRONMENT WITHIN A VIRTUAL COMPUTING ENVIRONMENT  
The present invention provides systems and methods for allowing a user to control their computing environment within a virtual computing environment. Specifically, various systems and methods as...
US20110162039 SECURE RESOURCE NAME RESOLUTION  
Techniques for securing name resolution technologies and for ensuring that name resolution technologies can function in modern networks that have a plurality of overlay networks accessible via a...
US20120054822 METHODS AND APPARATUS TO IMPLEMENT ELECTRONIC BOOK VIEWERS  
Example methods and apparatus to implement electronic book viewers are disclosed. A disclosed example method involves presenting content on a display panel removably attachable to a binding...
US20130081101 POLICY COMPLIANCE-BASED SECURE DATA ACCESS  
Access control techniques relate to verifying compliance with security policies before enabling access to the computing resources. An application is provided on a client that generates...
US20130227641 SYSTEMS AND METHODS TO ENFORCE SECURITY POLICIES ON THE LOADING, LINKING, AND EXECUTION OF NATIVE CODE BY MOBILE APPLICATIONS RUNNING INSIDE OF VIRTUAL MACHINES  
Methods and systems described herein relate to enhancing security on a device by enforcing one or more policies on the loading, linking, and/or executing of native code by one or more applications...
US20120110184 PHYSICAL LAYER PHOTONIC PROTOCOL SWITCH  
A physical layer photonic protocol switch (PLPPS) that is protocol independent and switches at the optical signal level. Computing subsystem resources are linked to the PLPPS and are grouped into...
US20140366082 OPTIMIZING RISK-BASED COMPLIANCE OF AN INFORMATION TECHNOLOGY (IT) SYSTEM  
For each of a plurality of endpoints of an information technology system having a plurality of security policies, a probability of being safe of each of said endpoints is determined according to...
US20120124639 VALIDATION OF CONSISTENCY AND COMPLETENESS OF ACCESS CONTROL POLICY SETS  
Consistency and/or completeness of access control policy sets may be validated and/or verified. An access control policy set may be received. The access control policy set may include access...
US20120023547 PRIVACY PREFERENCES MANAGEMENT SYSTEM  
The disclosed invention resides in a system and method for managing and maintaining an internet user's privacy directives without the necessity to rely on one or more cookies to be retained by a...
US20120116782 Security systems and/or methods for cloud computing environments  
Certain example embodiments described herein relate to security systems and/or methods for cloud computing environments. More particularly, certain example embodiments described herein relate to...
US20130332982 SYSTEM AND METHOD FOR IDENTITY BASED AUTHENTICATION IN A DISTRIBUTED VIRTUAL SWITCH NETWORK ENVIRONMENT  
An example method includes forwarding user credentials from a virtual machine in a distributed virtual switch (DVS) network environment to a network element outside the DVS network environment,...
US20110231896 SYSTEMS AND METHODS FOR REDIRECTION OF ONLINE QUERIES TO GENUINE CONTENT  
A system for redirection of online queries to a genuine content includes a user interface module to provide a user interface between a network user with administrative authority and an Internet...