WO2006019513A3 - End user risk management - Google Patents

End user risk management Download PDF

Info

Publication number
WO2006019513A3
WO2006019513A3 PCT/US2005/022352 US2005022352W WO2006019513A3 WO 2006019513 A3 WO2006019513 A3 WO 2006019513A3 US 2005022352 W US2005022352 W US 2005022352W WO 2006019513 A3 WO2006019513 A3 WO 2006019513A3
Authority
WO
WIPO (PCT)
Prior art keywords
end user
risks
risk management
user risk
risk
Prior art date
Application number
PCT/US2005/022352
Other languages
French (fr)
Other versions
WO2006019513A2 (en
Inventor
Jason Lieblich
Norman Dustin
Original Assignee
Reflectent Software Inc
Jason Lieblich
Norman Dustin
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Reflectent Software Inc, Jason Lieblich, Norman Dustin filed Critical Reflectent Software Inc
Priority to CA002574483A priority Critical patent/CA2574483A1/en
Priority to AU2005275524A priority patent/AU2005275524B2/en
Priority to EP05762383A priority patent/EP1769618B1/en
Priority to JP2007522513A priority patent/JP2008507757A/en
Publication of WO2006019513A2 publication Critical patent/WO2006019513A2/en
Publication of WO2006019513A3 publication Critical patent/WO2006019513A3/en
Priority to IL180821A priority patent/IL180821A0/en
Priority to HK07110792.2A priority patent/HK1107881A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Abstract

A flexible, efficient and easy-to-use computer security management system effectively evaluates and responds to informational risks on a wide variety of computing platforms and in a rapidly changing network environment. An individual computer system dynamically monitors its end user, without regard to network connectivity, in order to calculate a risk score and to ensure that the end user's behavior does not put corporate information or other assets at risk. Data regarding such risks and responses are analyzed and stored in real-time.
PCT/US2005/022352 2004-07-20 2005-06-23 End user risk management WO2006019513A2 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
CA002574483A CA2574483A1 (en) 2004-07-20 2005-06-23 End user risk management
AU2005275524A AU2005275524B2 (en) 2004-07-20 2005-06-23 End user risk management
EP05762383A EP1769618B1 (en) 2004-07-20 2005-06-23 End user risk management
JP2007522513A JP2008507757A (en) 2004-07-20 2005-06-23 End user risk management
IL180821A IL180821A0 (en) 2004-07-20 2007-01-21 End user risk management
HK07110792.2A HK1107881A1 (en) 2004-07-20 2007-10-04 End user risk management

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/894,714 US7490356B2 (en) 2004-07-20 2004-07-20 End user risk management
US10/894,714 2004-07-20

Publications (2)

Publication Number Publication Date
WO2006019513A2 WO2006019513A2 (en) 2006-02-23
WO2006019513A3 true WO2006019513A3 (en) 2006-04-06

Family

ID=35414786

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2005/022352 WO2006019513A2 (en) 2004-07-20 2005-06-23 End user risk management

Country Status (9)

Country Link
US (2) US7490356B2 (en)
EP (1) EP1769618B1 (en)
JP (1) JP2008507757A (en)
KR (1) KR20070065306A (en)
AU (1) AU2005275524B2 (en)
CA (1) CA2574483A1 (en)
HK (1) HK1107881A1 (en)
IL (1) IL180821A0 (en)
WO (1) WO2006019513A2 (en)

Families Citing this family (292)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080004922A1 (en) * 1997-01-06 2008-01-03 Jeff Scott Eder Detailed method of and system for modeling and analyzing business improvement programs
US10839321B2 (en) * 1997-01-06 2020-11-17 Jeffrey Eder Automated data storage system
US20040236673A1 (en) * 2000-10-17 2004-11-25 Eder Jeff Scott Collaborative risk transfer system
US20040215522A1 (en) * 2001-12-26 2004-10-28 Eder Jeff Scott Process optimization system
US20110040631A1 (en) * 2005-07-09 2011-02-17 Jeffrey Scott Eder Personalized commerce system
US9710852B1 (en) 2002-05-30 2017-07-18 Consumerinfo.Com, Inc. Credit report timeline user interface
US8417678B2 (en) 2002-07-30 2013-04-09 Storediq, Inc. System, method and apparatus for enterprise policy management
US7610329B2 (en) 2002-07-30 2009-10-27 Storediq, Inc. Method and apparatus for managing file systems and file-based data storage
US8612404B2 (en) * 2002-07-30 2013-12-17 Stored Iq, Inc. Harvesting file system metsdata
US7437760B2 (en) * 2002-10-10 2008-10-14 International Business Machines Corporation Antiviral network system
US7370212B2 (en) 2003-02-25 2008-05-06 Microsoft Corporation Issuing a publisher use license off-line in a digital rights management (DRM) system
US7761569B2 (en) 2004-01-23 2010-07-20 Tiversa, Inc. Method for monitoring and providing information over a peer to peer network
US20060242406A1 (en) * 2005-04-22 2006-10-26 Microsoft Corporation Protected computing environment
US8347078B2 (en) * 2004-10-18 2013-01-01 Microsoft Corporation Device certificate individualization
US20060089917A1 (en) * 2004-10-22 2006-04-27 Microsoft Corporation License synchronization
US8510331B1 (en) * 2004-10-28 2013-08-13 Storediq, Inc. System and method for a desktop agent for use in managing file systems
US20060101518A1 (en) * 2004-11-05 2006-05-11 Schumaker Troy T Method to generate a quantitative measurement of computer security vulnerabilities
US8464348B2 (en) * 2004-11-15 2013-06-11 Microsoft Corporation Isolated computing environment anchored into CPU and motherboard
US8336085B2 (en) * 2004-11-15 2012-12-18 Microsoft Corporation Tuning product policy using observed evidence of customer behavior
US8176564B2 (en) * 2004-11-15 2012-05-08 Microsoft Corporation Special PC mode entered upon detection of undesired state
US20060106920A1 (en) * 2004-11-15 2006-05-18 Microsoft Corporation Method and apparatus for dynamically activating/deactivating an operating system
US7716300B2 (en) * 2005-02-22 2010-05-11 Microsoft Corporation Systems and methods to facilitate self regulation of social networks through trading and gift exchange
US8438645B2 (en) 2005-04-27 2013-05-07 Microsoft Corporation Secure clock with grace periods
US8725646B2 (en) 2005-04-15 2014-05-13 Microsoft Corporation Output protection levels
US9436804B2 (en) 2005-04-22 2016-09-06 Microsoft Technology Licensing, Llc Establishing a unique session key using a hardware functionality scan
US9363481B2 (en) 2005-04-22 2016-06-07 Microsoft Technology Licensing, Llc Protected media pipeline
US20060265374A1 (en) * 2005-05-19 2006-11-23 Smith Thomas W Multipurpose database
US20060265758A1 (en) 2005-05-20 2006-11-23 Microsoft Corporation Extensible media rights
US8578500B2 (en) * 2005-05-31 2013-11-05 Kurt James Long System and method of fraud and misuse detection
US8353046B2 (en) * 2005-06-08 2013-01-08 Microsoft Corporation System and method for delivery of a modular operating system
GB0512744D0 (en) * 2005-06-22 2005-07-27 Blackspider Technologies Method and system for filtering electronic messages
CN101305375A (en) * 2005-09-12 2008-11-12 沙盒技术有限公司 System and method for controlling distribution of electronic information
US7712132B1 (en) 2005-10-06 2010-05-04 Ogilvie John W Detecting surreptitious spyware
US20070150599A1 (en) * 2005-12-22 2007-06-28 International Business Machines Corporation Generation of resource-usage profiles for application sessions of a number of client computing devices
US9942271B2 (en) * 2005-12-29 2018-04-10 Nextlabs, Inc. Information management system with two or more interactive enforcement points
US7917532B1 (en) * 2005-12-30 2011-03-29 United Services Automobile Association (Usaa) System for tracking data shared with external entities
US8307427B1 (en) 2005-12-30 2012-11-06 United Services (USAA) Automobile Association System for tracking data shared with external entities
US8280805B1 (en) 2006-01-10 2012-10-02 Sas Institute Inc. Computer-implemented risk evaluation systems and methods
US7912773B1 (en) * 2006-03-24 2011-03-22 Sas Institute Inc. Computer-implemented data storage systems and methods for use with predictive model systems
CN1835014A (en) * 2006-03-28 2006-09-20 阿里巴巴公司 Method and system of monitoring on-line service risk
US20080047017A1 (en) * 2006-06-23 2008-02-21 Martin Renaud System and method for dynamically assessing security risks attributed to a computer user's behavior
US8255517B1 (en) * 2006-06-29 2012-08-28 Symantec Corporation Method and apparatus to determine device mobility history
US8149849B2 (en) * 2006-08-31 2012-04-03 Sony Ericsson Mobile Communications Ab Zigbee/IP gateway
US8056134B1 (en) 2006-09-10 2011-11-08 Ogilvie John W Malware detection and identification via malware spoofing
CA2668881C (en) 2006-11-07 2016-07-26 Tiversa, Inc. System and method for enhanced experience with a peer to peer network
US9396328B2 (en) * 2007-01-11 2016-07-19 Symantec Corporation Determining a contributing entity for a window
US20080184026A1 (en) * 2007-01-29 2008-07-31 Hall Martin H Metered Personal Computer Lifecycle
CN101622849B (en) * 2007-02-02 2014-06-11 网圣公司 System and method for adding context to prevent data leakage over a computer network
US8190512B1 (en) 2007-02-20 2012-05-29 Sas Institute Inc. Computer-implemented clustering systems and methods for action determination
US8346691B1 (en) 2007-02-20 2013-01-01 Sas Institute Inc. Computer-implemented semi-supervised learning systems and methods
US20080201780A1 (en) * 2007-02-20 2008-08-21 Microsoft Corporation Risk-Based Vulnerability Assessment, Remediation and Network Access Protection
US8015133B1 (en) 2007-02-20 2011-09-06 Sas Institute Inc. Computer-implemented modeling systems and methods for analyzing and predicting computer network intrusions
US8285656B1 (en) 2007-03-30 2012-10-09 Consumerinfo.Com, Inc. Systems and methods for data verification
CN105321108B (en) * 2007-04-12 2019-10-18 克罗尔信息保证有限责任公司 A kind of system and method for creating list of shared information over a peer-to-peer
US8996681B2 (en) * 2007-04-23 2015-03-31 The Mitre Corporation Passively attributing anonymous network events to their associated users
US8707431B2 (en) * 2007-04-24 2014-04-22 The Mitre Corporation Insider threat detection
US20080288330A1 (en) * 2007-05-14 2008-11-20 Sailpoint Technologies, Inc. System and method for user access risk scoring
JP5112751B2 (en) * 2007-06-05 2013-01-09 株式会社日立ソリューションズ Self-inspection system for security measures
BRPI0813820A2 (en) * 2007-06-11 2015-01-06 Tiversa Inc SYSTEM AND METHOD FOR ADVERTISING IN A Peer-to-Peer Network.
US20090019170A1 (en) * 2007-07-09 2009-01-15 Felix Immanuel Wyss System and method for secure communication configuration
US8959624B2 (en) * 2007-10-31 2015-02-17 Bank Of America Corporation Executable download tracking system
US8122510B2 (en) * 2007-11-14 2012-02-21 Bank Of America Corporation Method for analyzing and managing unstructured data
US8875259B2 (en) * 2007-11-15 2014-10-28 Salesforce.Com, Inc. On-demand service security system and method for managing a risk of access as a condition of permitting access to the on-demand service
US7890357B2 (en) * 2007-11-20 2011-02-15 Hartford Fire Insurance Company System and method for identifying and evaluating nanomaterial-related risk
US8862622B2 (en) * 2007-12-10 2014-10-14 Sprylogics International Corp. Analysis, inference, and visualization of social networks
US8528094B1 (en) * 2007-12-14 2013-09-03 Bank Of America Corporation Automated information association and reporting
US9990674B1 (en) 2007-12-14 2018-06-05 Consumerinfo.Com, Inc. Card registry systems and methods
US8127986B1 (en) 2007-12-14 2012-03-06 Consumerinfo.Com, Inc. Card registry systems and methods
US8370948B2 (en) * 2008-03-19 2013-02-05 Websense, Inc. System and method for analysis of electronic information dissemination events
US9130986B2 (en) * 2008-03-19 2015-09-08 Websense, Inc. Method and system for protection against information stealing software
US8407784B2 (en) * 2008-03-19 2013-03-26 Websense, Inc. Method and system for protection against information stealing software
US9015842B2 (en) 2008-03-19 2015-04-21 Websense, Inc. Method and system for protection against information stealing software
US20090265755A1 (en) * 2008-04-18 2009-10-22 International Business Machines Corporation Firewall methodologies for use within virtual environments
US8515862B2 (en) 2008-05-29 2013-08-20 Sas Institute Inc. Computer-implemented systems and methods for integrated model validation for compliance and credit risk
US8312033B1 (en) 2008-06-26 2012-11-13 Experian Marketing Solutions, Inc. Systems and methods for providing an integrated identifier
US8204180B1 (en) * 2008-08-08 2012-06-19 Intervoice Limited Partnership Systems and methods for preventing sensitive information from being communicated into a non-secure environment
US9256904B1 (en) 2008-08-14 2016-02-09 Experian Information Solutions, Inc. Multi-bureau credit file freeze and unfreeze
US9495538B2 (en) * 2008-09-25 2016-11-15 Symantec Corporation Graduated enforcement of restrictions according to an application's reputation
US8353021B1 (en) 2008-09-30 2013-01-08 Symantec Corporation Determining firewall rules for an application on a client based on firewall rules and reputations of other clients
US8060424B2 (en) 2008-11-05 2011-11-15 Consumerinfo.Com, Inc. On-line method and system for monitoring and reporting unused available credit
US8326987B2 (en) * 2008-11-12 2012-12-04 Lin Yeejang James Method for adaptively building a baseline behavior model
US20100125911A1 (en) * 2008-11-17 2010-05-20 Prakash Bhaskaran Risk Scoring Based On Endpoint User Activities
US8904540B1 (en) * 2008-12-17 2014-12-02 Symantec Corporation Method and apparatus for evaluating hygiene of a computer
US8275899B2 (en) * 2008-12-29 2012-09-25 At&T Intellectual Property I, L.P. Methods, devices and computer program products for regulating network activity using a subscriber scoring system
US8407194B1 (en) * 2009-01-15 2013-03-26 Privity Systems Inc. Data classification and privacy repository
US8112546B2 (en) * 2009-02-13 2012-02-07 Microsoft Corporation Routing users to receive online services based on online behavior
US9275231B1 (en) * 2009-03-10 2016-03-01 Symantec Corporation Method and apparatus for securing a computer using an optimal configuration for security software based on user behavior
US8495384B1 (en) * 2009-03-10 2013-07-23 James DeLuccia Data comparison system
US8392379B2 (en) * 2009-03-17 2013-03-05 Sophos Plc Method and system for preemptive scanning of computer files
US8239953B1 (en) 2009-03-26 2012-08-07 Symantec Corporation Applying differing security policies for users who contribute differently to machine hygiene
US8555391B1 (en) 2009-04-25 2013-10-08 Dasient, Inc. Adaptive scanning
US8683584B1 (en) * 2009-04-25 2014-03-25 Dasient, Inc. Risk assessment
US8516590B1 (en) 2009-04-25 2013-08-20 Dasient, Inc. Malicious advertisement detection and remediation
US8370938B1 (en) 2009-04-25 2013-02-05 Dasient, Inc. Mitigating malware
WO2010138466A1 (en) 2009-05-26 2010-12-02 Wabsense, Inc. Systems and methods for efficeint detection of fingerprinted data and information
US8752180B2 (en) * 2009-05-26 2014-06-10 Symantec Corporation Behavioral engine for identifying patterns of confidential data use
US8312543B1 (en) 2009-06-30 2012-11-13 Symantec Corporation Using URL reputation data to selectively block cookies
US8478708B1 (en) * 2009-07-30 2013-07-02 Zscaler, Inc. System and method for determining risk posed by a web user
US8566932B1 (en) 2009-07-31 2013-10-22 Symantec Corporation Enforcing good network hygiene using reputation-based automatic remediation
CN102014145A (en) * 2009-09-04 2011-04-13 鸿富锦精密工业(深圳)有限公司 File transfer security control system and method
US9742778B2 (en) * 2009-09-09 2017-08-22 International Business Machines Corporation Differential security policies in email systems
TWI464615B (en) * 2009-09-14 2014-12-11 Hon Hai Prec Ind Co Ltd System and Method for Controlling File Transfer
US9009834B1 (en) * 2009-09-24 2015-04-14 Google Inc. System policy violation detection
US7917593B1 (en) * 2009-10-23 2011-03-29 Symantec Corporation Method and system for employing automatic reply systems to detect e-mail scammer IP addresses
US7917655B1 (en) * 2009-10-23 2011-03-29 Symantec Corporation Method and system for employing phone number analysis to detect and prevent spam and e-mail scams
US8776168B1 (en) * 2009-10-29 2014-07-08 Symantec Corporation Applying security policy based on behaviorally-derived user risk profiles
US8805737B1 (en) * 2009-11-02 2014-08-12 Sas Institute Inc. Computer-implemented multiple entity dynamic summarization systems and methods
US10282702B2 (en) * 2010-01-04 2019-05-07 Bank Of America Corporation Dynamic employee security risk scoring
WO2011082489A1 (en) * 2010-01-06 2011-07-14 Vitrium Systems Inc. Method and system of providing a viewing experience with respect to a document having read-only content
US8255572B1 (en) * 2010-01-22 2012-08-28 Symantec Corporation Method and system to detect and prevent e-mail scams
US8800034B2 (en) 2010-01-26 2014-08-05 Bank Of America Corporation Insider threat correlation tool
US9038187B2 (en) * 2010-01-26 2015-05-19 Bank Of America Corporation Insider threat correlation tool
US8782209B2 (en) * 2010-01-26 2014-07-15 Bank Of America Corporation Insider threat correlation tool
US8793789B2 (en) 2010-07-22 2014-07-29 Bank Of America Corporation Insider threat correlation tool
US8769373B2 (en) 2010-03-22 2014-07-01 Cleon L. Rogers, JR. Method of identifying and protecting the integrity of a set of source data
US9652802B1 (en) 2010-03-24 2017-05-16 Consumerinfo.Com, Inc. Indirect monitoring and reporting of a user's credit data
US9619652B2 (en) * 2010-03-31 2017-04-11 Salesforce.Com, Inc. System, method and computer program product for determining a risk score for an entity
US8782794B2 (en) 2010-04-16 2014-07-15 Bank Of America Corporation Detecting secure or encrypted tunneling in a computer network
US8417996B2 (en) * 2010-04-19 2013-04-09 International Business Machines Corporation Facade for business risk minimization in change administration via risk estimation and mistake identification by ticket analysis
WO2011153617A2 (en) * 2010-06-09 2011-12-15 Pravala Inc. Reducing load at a proxy server
US8566956B2 (en) * 2010-06-23 2013-10-22 Salesforce.Com, Inc. Monitoring and reporting of data access behavior of authorized database users
US8744956B1 (en) 2010-07-01 2014-06-03 Experian Information Solutions, Inc. Systems and methods for permission arbitrated transaction services
US8931058B2 (en) 2010-07-01 2015-01-06 Experian Information Solutions, Inc. Systems and methods for permission arbitrated transaction services
US9406048B2 (en) * 2010-07-07 2016-08-02 Mark Meister Email system for preventing inadvertant transmission of propriety message or documents to unintended recipient
US8826444B1 (en) * 2010-07-09 2014-09-02 Symantec Corporation Systems and methods for using client reputation data to classify web domains
US8930262B1 (en) 2010-11-02 2015-01-06 Experian Technology Ltd. Systems and methods of assisted strategy design
US9147042B1 (en) 2010-11-22 2015-09-29 Experian Information Solutions, Inc. Systems and methods for data verification
US8516597B1 (en) * 2010-12-02 2013-08-20 Symantec Corporation Method to calculate a risk score of a folder that has been scanned for confidential information
US9094291B1 (en) 2010-12-14 2015-07-28 Symantec Corporation Partial risk score calculation for a data object
US9129257B2 (en) * 2010-12-20 2015-09-08 Verizon Patent And Licensing Inc. Method and system for monitoring high risk users
US8782782B1 (en) * 2010-12-23 2014-07-15 Emc Corporation Computer system with risk-based assessment and protection against harmful user activity
US8806591B2 (en) * 2011-01-07 2014-08-12 Verizon Patent And Licensing Inc. Authentication risk evaluation
US9235728B2 (en) 2011-02-18 2016-01-12 Csidentity Corporation System and methods for identifying compromised personally identifiable information on the internet
US8560722B2 (en) * 2011-03-18 2013-10-15 International Business Machines Corporation System and method to govern sensitive data exchange with mobile devices based on threshold sensitivity values
US9122877B2 (en) 2011-03-21 2015-09-01 Mcafee, Inc. System and method for malware and network reputation correlation
US9065799B2 (en) * 2011-04-15 2015-06-23 Lockheed Martin Corporation Method and apparatus for cyber security
US8914545B2 (en) * 2011-04-27 2014-12-16 Iii Holdings 1, Llc Systems and methods for lossless compression of data and high speed manipulation thereof
US9558519B1 (en) 2011-04-29 2017-01-31 Consumerinfo.Com, Inc. Exposing reporting cycle information
US9665854B1 (en) 2011-06-16 2017-05-30 Consumerinfo.Com, Inc. Authentication alerts
US9106680B2 (en) 2011-06-27 2015-08-11 Mcafee, Inc. System and method for protocol fingerprinting and reputation correlation
US9239908B1 (en) * 2011-06-29 2016-01-19 Emc Corporation Managing organization based security risks
US8099596B1 (en) * 2011-06-30 2012-01-17 Kaspersky Lab Zao System and method for malware protection using virtualization
US9483606B1 (en) 2011-07-08 2016-11-01 Consumerinfo.Com, Inc. Lifescore
US20130018921A1 (en) * 2011-07-13 2013-01-17 International Business Machines Corporation Need-to-know information access using quantified risk
US8726379B1 (en) * 2011-07-15 2014-05-13 Norse Corporation Systems and methods for dynamic protection from electronic attacks
US20150193226A1 (en) * 2011-08-10 2015-07-09 Interactive TKO, Inc. Instrumentation agent for manipulating component responses
US8881258B2 (en) 2011-08-24 2014-11-04 Mcafee, Inc. System, method, and computer program for preventing infections from spreading in a network environment using dynamic application of a firewall policy
US9106691B1 (en) 2011-09-16 2015-08-11 Consumerinfo.Com, Inc. Systems and methods of identity protection and management
US8869241B2 (en) * 2011-09-24 2014-10-21 Elwha Llc Network acquired behavioral fingerprint for authentication
US9825967B2 (en) 2011-09-24 2017-11-21 Elwha Llc Behavioral fingerprinting via social networking interaction
US9729549B2 (en) 2011-09-24 2017-08-08 Elwha Llc Behavioral fingerprinting with adaptive development
US9348985B2 (en) 2011-11-23 2016-05-24 Elwha Llc Behavioral fingerprint controlled automatic task determination
US9621404B2 (en) 2011-09-24 2017-04-11 Elwha Llc Behavioral fingerprinting with social networking
US9298900B2 (en) 2011-09-24 2016-03-29 Elwha Llc Behavioral fingerprinting via inferred personal relation
US9015860B2 (en) 2011-09-24 2015-04-21 Elwha Llc Behavioral fingerprinting via derived personal relation
US8688980B2 (en) 2011-09-24 2014-04-01 Elwha Llc Trust verification schema based transaction authorization
US8713704B2 (en) 2011-09-24 2014-04-29 Elwha Llc Behavioral fingerprint based authentication
US9083687B2 (en) 2011-09-24 2015-07-14 Elwha Llc Multi-device behavioral fingerprinting
US8739290B1 (en) * 2011-09-29 2014-05-27 Emc Corporation Generating alerts in event management systems
US8706648B2 (en) * 2011-10-03 2014-04-22 International Business Machines Corporation Assessing social risk due to exposure from linked contacts
US8712921B2 (en) * 2011-10-03 2014-04-29 International Business Machines Corporation Receiving security risk feedback from linked contacts due to a user's system actions and behaviors
US8738516B1 (en) 2011-10-13 2014-05-27 Consumerinfo.Com, Inc. Debt services candidate locator
US8768866B2 (en) 2011-10-21 2014-07-01 Sas Institute Inc. Computer-implemented systems and methods for forecasting and estimation using grid regression
US8832840B2 (en) * 2011-10-26 2014-09-09 Verizon Patent And Licensing Inc. Mobile application security and management service
US11030562B1 (en) * 2011-10-31 2021-06-08 Consumerinfo.Com, Inc. Pre-data breach monitoring
US9009334B1 (en) * 2011-12-09 2015-04-14 Amazon Technologies, Inc. Remote browsing session management
US8484741B1 (en) 2012-01-27 2013-07-09 Chapman Technology Group, Inc. Software service to facilitate organizational testing of employees to determine their potential susceptibility to phishing scams
US8931043B2 (en) * 2012-04-10 2015-01-06 Mcafee Inc. System and method for determining and using local reputations of users and hosts to protect information in a network environment
US9853959B1 (en) 2012-05-07 2017-12-26 Consumerinfo.Com, Inc. Storage and maintenance of personal data
US9043903B2 (en) 2012-06-08 2015-05-26 Crowdstrike, Inc. Kernel-level security agent
US8775206B2 (en) * 2012-06-26 2014-07-08 Amit Kulkarni Healthcare privacy violation detection and investigation system and method
US9639678B2 (en) 2012-06-29 2017-05-02 Microsoft Technology Licensing, Llc Identity risk score generation and implementation
US9292881B2 (en) 2012-06-29 2016-03-22 Crowdstrike, Inc. Social sharing of security information in a group
US9213827B2 (en) 2012-09-27 2015-12-15 Intel Corporation Security data aggregation and business intelligence for web applications
US20140137190A1 (en) * 2012-11-09 2014-05-15 Rapid7, Inc. Methods and systems for passively detecting security levels in client devices
US9654541B1 (en) 2012-11-12 2017-05-16 Consumerinfo.Com, Inc. Aggregating user web browsing data
US8856894B1 (en) 2012-11-28 2014-10-07 Consumerinfo.Com, Inc. Always on authentication
US9241259B2 (en) 2012-11-30 2016-01-19 Websense, Inc. Method and apparatus for managing the transfer of sensitive information to mobile devices
US9916621B1 (en) 2012-11-30 2018-03-13 Consumerinfo.Com, Inc. Presentation of credit score factors
US10255598B1 (en) 2012-12-06 2019-04-09 Consumerinfo.Com, Inc. Credit card account data extraction
US8839449B1 (en) * 2012-12-19 2014-09-16 Emc Corporation Assessing risk of information leakage
US9398038B2 (en) 2013-02-08 2016-07-19 PhishMe, Inc. Collaborative phishing attack detection
US9053326B2 (en) 2013-02-08 2015-06-09 PhishMe, Inc. Simulated phishing attack with sequential messages
US9356948B2 (en) 2013-02-08 2016-05-31 PhishMe, Inc. Collaborative phishing attack detection
US9253207B2 (en) 2013-02-08 2016-02-02 PhishMe, Inc. Collaborative phishing attack detection
US8966637B2 (en) 2013-02-08 2015-02-24 PhishMe, Inc. Performance benchmarking for simulated phishing attacks
US9697263B1 (en) 2013-03-04 2017-07-04 Experian Information Solutions, Inc. Consumer data request fulfillment system
US10102570B1 (en) 2013-03-14 2018-10-16 Consumerinfo.Com, Inc. Account vulnerability alerts
US8812387B1 (en) 2013-03-14 2014-08-19 Csidentity Corporation System and method for identifying related credit inquiries
US9406085B1 (en) 2013-03-14 2016-08-02 Consumerinfo.Com, Inc. System and methods for credit dispute processing, resolution, and reporting
US9870589B1 (en) 2013-03-14 2018-01-16 Consumerinfo.Com, Inc. Credit utilization tracking and reporting
US9594907B2 (en) 2013-03-14 2017-03-14 Sas Institute Inc. Unauthorized activity detection and classification
US9231979B2 (en) 2013-03-14 2016-01-05 Sas Institute Inc. Rule optimization for classification and detection
US10664936B2 (en) 2013-03-15 2020-05-26 Csidentity Corporation Authentication systems and methods for on-demand products
US9633322B1 (en) 2013-03-15 2017-04-25 Consumerinfo.Com, Inc. Adjustment of knowledge-based authentication
US9202038B1 (en) * 2013-04-08 2015-12-01 Amazon Technologies, Inc. Risk based authentication
US10685398B1 (en) 2013-04-23 2020-06-16 Consumerinfo.Com, Inc. Presenting credit score information
US9264442B2 (en) * 2013-04-26 2016-02-16 Palo Alto Research Center Incorporated Detecting anomalies in work practice data by combining multiple domains of information
US9721147B1 (en) 2013-05-23 2017-08-01 Consumerinfo.Com, Inc. Digital identity
US9443268B1 (en) 2013-08-16 2016-09-13 Consumerinfo.Com, Inc. Bill payment and reporting
US10102536B1 (en) 2013-11-15 2018-10-16 Experian Information Solutions, Inc. Micro-geographic aggregation system
US10325314B1 (en) 2013-11-15 2019-06-18 Consumerinfo.Com, Inc. Payment reporting systems
US9477737B1 (en) 2013-11-20 2016-10-25 Consumerinfo.Com, Inc. Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules
US9529851B1 (en) 2013-12-02 2016-12-27 Experian Information Solutions, Inc. Server architecture for electronic data quality processing
US9613196B2 (en) * 2013-12-19 2017-04-04 Intel Corporation Protection system including machine learning snapshot evaluation
US9262629B2 (en) 2014-01-21 2016-02-16 PhishMe, Inc. Methods and systems for preventing malicious use of phishing simulation records
US10262362B1 (en) 2014-02-14 2019-04-16 Experian Information Solutions, Inc. Automatic generation of code for attributes
US10289405B2 (en) 2014-03-20 2019-05-14 Crowdstrike, Inc. Integrity assurance and rebootless updating during runtime
USD760256S1 (en) 2014-03-25 2016-06-28 Consumerinfo.Com, Inc. Display screen or portion thereof with graphical user interface
USD759689S1 (en) 2014-03-25 2016-06-21 Consumerinfo.Com, Inc. Display screen or portion thereof with graphical user interface
USD759690S1 (en) 2014-03-25 2016-06-21 Consumerinfo.Com, Inc. Display screen or portion thereof with graphical user interface
US9892457B1 (en) 2014-04-16 2018-02-13 Consumerinfo.Com, Inc. Providing credit data in search results
US10373240B1 (en) 2014-04-25 2019-08-06 Csidentity Corporation Systems, methods and computer-program products for eligibility verification
US20170103194A1 (en) * 2014-05-30 2017-04-13 Pcms Holdings, Inc. Systems and methods for active authentication
US9225695B1 (en) * 2014-06-10 2015-12-29 Lockheed Martin Corporation Storing and transmitting sensitive data
US10430789B1 (en) 2014-06-10 2019-10-01 Lockheed Martin Corporation System, method and computer program product for secure retail transactions (SRT)
US9697385B2 (en) 2014-06-20 2017-07-04 Google Inc. Security adjustments in mobile devices
US9942250B2 (en) 2014-08-06 2018-04-10 Norse Networks, Inc. Network appliance for dynamic protection from risky network activities
US9407655B2 (en) * 2014-08-27 2016-08-02 Bank Of America Corporation Monitoring security risks to enterprise corresponding to access rights and access risk calculation
US10162969B2 (en) * 2014-09-10 2018-12-25 Honeywell International Inc. Dynamic quantification of cyber-security risks in a control system
WO2016053261A1 (en) 2014-09-29 2016-04-07 Hewlett Packard Enterprise Development Lp Detection of email-related vulnerabilities
US20160104476A1 (en) 2014-10-09 2016-04-14 International Business Machines Corporation Cognitive Security for Voice Phishing Activity
CN107004087B (en) * 2014-10-24 2021-04-27 迈克菲有限公司 Proxy presence for self-healing
WO2016070096A1 (en) 2014-10-30 2016-05-06 Sas Institute Inc. Generating accurate reason codes with complex non-linear modeling and neural networks
US10339527B1 (en) 2014-10-31 2019-07-02 Experian Information Solutions, Inc. System and architecture for electronic fraud detection
US11855768B2 (en) 2014-12-29 2023-12-26 Guidewire Software, Inc. Disaster scenario based inferential analysis using feedback for extracting and combining cyber risk information
WO2017078986A1 (en) 2014-12-29 2017-05-11 Cyence Inc. Diversity analysis with actionable feedback methodologies
US11863590B2 (en) 2014-12-29 2024-01-02 Guidewire Software, Inc. Inferential analysis using feedback for extracting and combining cyber risk information
US10050990B2 (en) 2014-12-29 2018-08-14 Guidewire Software, Inc. Disaster scenario based inferential analysis using feedback for extracting and combining cyber risk information
CA2975509A1 (en) 2015-02-05 2016-08-11 Phishline, Llc Social engineering simulation workflow appliance
USD814494S1 (en) 2015-03-02 2018-04-03 Norse Networks, Inc. Computer display panel with an icon image of a live electronic threat intelligence visualization interface
US10404748B2 (en) * 2015-03-31 2019-09-03 Guidewire Software, Inc. Cyber risk analysis and remediation using network monitored sensors and methods of use
US9906539B2 (en) 2015-04-10 2018-02-27 PhishMe, Inc. Suspicious message processing and incident response
USD810775S1 (en) 2015-04-21 2018-02-20 Norse Networks, Inc. Computer display panel with a graphical live electronic threat intelligence visualization interface
US10129220B2 (en) 2015-06-13 2018-11-13 Avocado Systems Inc. Application and data protection tag
US10270810B2 (en) 2015-06-14 2019-04-23 Avocado Systems Inc. Data socket descriptor based policies for application and data behavior and security
US10193889B2 (en) 2015-06-14 2019-01-29 Avocado Systems Inc. Data socket descriptor attributes for application discovery in data centers
US10397277B2 (en) 2015-06-14 2019-08-27 Avocado Systems Inc. Dynamic data socket descriptor mirroring mechanism and use for security analytics
US10148697B2 (en) 2015-06-16 2018-12-04 Avocado Systems Inc. Unified host based security exchange between heterogeneous end point security agents
US10193930B2 (en) * 2015-06-29 2019-01-29 Avocado Systems Inc. Application security capability exchange via the application and data protection layer
US9923914B2 (en) 2015-06-30 2018-03-20 Norse Networks, Inc. Systems and platforms for intelligently monitoring risky network activities
US11151468B1 (en) 2015-07-02 2021-10-19 Experian Information Solutions, Inc. Behavior analysis using distributed representations of event data
US10356068B2 (en) 2015-07-14 2019-07-16 Avocado Systems Inc. Security key generator module for security sensitive applications
US10339316B2 (en) 2015-07-28 2019-07-02 Crowdstrike, Inc. Integrity assurance through early loading in the boot phase
WO2017027029A1 (en) * 2015-08-12 2017-02-16 Hewlett Packard Enterprise Development Lp Training a security scan classifier to learn an issue preference of a human auditor
US10354070B2 (en) 2015-08-22 2019-07-16 Avocado Systems Inc. Thread level access control to socket descriptors and end-to-end thread level policies for thread protection
US10757154B1 (en) 2015-11-24 2020-08-25 Experian Information Solutions, Inc. Real-time event-based notification system
US10715544B2 (en) * 2016-02-05 2020-07-14 Sony Corporation Method, apparatus and system for calculating a risk score of a user request by a user on a web application
US10084809B1 (en) * 2016-05-06 2018-09-25 Wells Fargo Bank, N.A. Enterprise security measures
US9699305B1 (en) * 2016-06-07 2017-07-04 International Business Machines Corporation Caller relationship and risk assessment
US9973522B2 (en) * 2016-07-08 2018-05-15 Accenture Global Solutions Limited Identifying network security risks
US10839703B2 (en) * 2016-12-30 2020-11-17 Fortinet, Inc. Proactive network security assessment based on benign variants of known threats
US10581896B2 (en) 2016-12-30 2020-03-03 Chronicle Llc Remedial actions based on user risk assessments
CN110383319B (en) 2017-01-31 2023-05-26 益百利信息解决方案公司 Large scale heterogeneous data ingestion and user resolution
US10387228B2 (en) 2017-02-21 2019-08-20 Crowdstrike, Inc. Symmetric bridge component for communications between kernel mode and user mode
US10230690B2 (en) * 2017-03-23 2019-03-12 International Business Machines Corporation Digital media content distribution blocking
RU2670030C2 (en) * 2017-04-05 2018-10-17 Общество С Ограниченной Ответственностью "Яндекс" Methods and systems for determining non-standard user activity
US10592837B2 (en) * 2017-04-21 2020-03-17 Accenture Global Solutions Limited Identifying security risks via analysis of multi-level analytical records
US20180316709A1 (en) * 2017-04-28 2018-11-01 NURO Secure Messaging Ltd. System and method for detecting regulatory anomalies within electronic communication
SG11201710238QA (en) * 2017-06-29 2019-01-30 Certis Cisco Security Pte Ltd Autonomic incident triage prioritization by performance modifier and temporal decay parameters
US10735183B1 (en) 2017-06-30 2020-08-04 Experian Information Solutions, Inc. Symmetric encryption for private smart contracts among multiple parties in a private peer-to-peer network
US10318729B2 (en) * 2017-07-26 2019-06-11 Forcepoint, LLC Privacy protection during insider threat monitoring
US10699028B1 (en) 2017-09-28 2020-06-30 Csidentity Corporation Identity security architecture systems and methods
US10896472B1 (en) 2017-11-14 2021-01-19 Csidentity Corporation Security and identity verification system and architecture
US10740459B2 (en) 2017-12-28 2020-08-11 Crowdstrike, Inc. Kernel- and user-level cooperative security processing
US11477219B2 (en) * 2018-02-20 2022-10-18 Darktrace Holdings Limited Endpoint agent and system
EP3785152A4 (en) * 2018-04-27 2021-12-22 Dcoya Ltd. System and method for securing electronic correspondence
US10911234B2 (en) 2018-06-22 2021-02-02 Experian Information Solutions, Inc. System and method for a token gateway environment
US11120122B2 (en) 2018-07-18 2021-09-14 International Business Machines Corporation Augmenting password generation and validation
CN109255518A (en) * 2018-08-01 2019-01-22 阿里巴巴集团控股有限公司 Data application risk appraisal procedure, device and system
US11321467B2 (en) * 2018-08-21 2022-05-03 Beijing Didi Infinity Technology And Development Co., Ltd. System and method for security analysis
US20200067961A1 (en) * 2018-08-21 2020-02-27 Didi Research America, Llc Data security risks evaluation for threat detection
US10880313B2 (en) 2018-09-05 2020-12-29 Consumerinfo.Com, Inc. Database platform for realtime updating of user data from third party sources
US10963434B1 (en) 2018-09-07 2021-03-30 Experian Information Solutions, Inc. Data architecture for supporting multiple search models
US11315179B1 (en) 2018-11-16 2022-04-26 Consumerinfo.Com, Inc. Methods and apparatuses for customized card recommendations
US11023582B2 (en) * 2018-12-19 2021-06-01 EMC IP Holding Company LLC Identification and control of malicious users on a data storage system
CN110865774B (en) * 2018-12-28 2023-08-08 安天科技集团股份有限公司 Information security detection method and device for printing equipment
WO2020146667A1 (en) 2019-01-11 2020-07-16 Experian Information Solutions, Inc. Systems and methods for secure data aggregation and computation
US11238656B1 (en) 2019-02-22 2022-02-01 Consumerinfo.Com, Inc. System and method for an augmented reality experience via an artificial intelligence bot
US11126746B2 (en) * 2019-03-28 2021-09-21 The Toronto-Dominion Bank Dynamic security controls for data sharing between systems
US10877866B2 (en) 2019-05-09 2020-12-29 International Business Machines Corporation Diagnosing workload performance problems in computer servers
US11165679B2 (en) 2019-05-09 2021-11-02 International Business Machines Corporation Establishing consumed resource to consumer relationships in computer servers using micro-trend technology
US11537668B2 (en) * 2019-08-14 2022-12-27 Proofpoint, Inc. Using a machine learning system to process a corpus of documents associated with a user to determine a user-specific and/or process-specific consequence index
US11941065B1 (en) 2019-09-13 2024-03-26 Experian Information Solutions, Inc. Single identifier platform for storing entity data
US11182269B2 (en) 2019-10-01 2021-11-23 International Business Machines Corporation Proactive change verification
US11586685B2 (en) 2019-10-31 2023-02-21 Citrix Systems, Inc. Systems and methods for generating data structures from browser data to determine and initiate actions based thereon
US11463467B2 (en) * 2020-01-09 2022-10-04 Kyndryl, Inc. Advanced risk evaluation for servers
US11531765B2 (en) * 2020-07-16 2022-12-20 Allstate Insurance Company Dynamic system profiling based on data extraction
US11880377B1 (en) 2021-03-26 2024-01-23 Experian Information Solutions, Inc. Systems and methods for entity resolution
WO2023026132A1 (en) * 2021-08-25 2023-03-02 Morphisec Information Security 2014 Ltd. Continuous vulnerability assessment system
WO2023175756A1 (en) * 2022-03-16 2023-09-21 日本電信電話株式会社 Policy control device, zero trust system, policy control method, and policy control program
CN114896615B (en) * 2022-05-19 2023-03-28 厦门智宇信息技术有限公司 Data security access system based on big data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6405318B1 (en) * 1999-03-12 2002-06-11 Psionic Software, Inc. Intrusion detection system
US6546493B1 (en) * 2001-11-30 2003-04-08 Networks Associates Technology, Inc. System, method and computer program product for risk assessment scanning based on detected anomalous events
US20030154393A1 (en) * 2002-02-12 2003-08-14 Carl Young Automated security management
US20040034794A1 (en) * 2000-05-28 2004-02-19 Yaron Mayer System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6219805B1 (en) * 1998-09-15 2001-04-17 Nortel Networks Limited Method and system for dynamic risk assessment of software systems
US6470319B1 (en) * 1999-06-25 2002-10-22 Community Corrections Improvement Association Data processing system for determining case management plan for criminal offender
US6912502B1 (en) * 1999-12-30 2005-06-28 Genworth Financial, Inc., System and method for compliance management
US7136860B2 (en) * 2000-02-14 2006-11-14 Overture Services, Inc. System and method to determine the validity of an interaction on a network
US6553377B1 (en) * 2000-03-31 2003-04-22 Network Associates, Inc. System and process for maintaining a plurality of remote security applications using a modular framework in a distributed computing environment
US6553378B1 (en) * 2000-03-31 2003-04-22 Network Associates, Inc. System and process for reporting network events with a plurality of hierarchically-structured databases in a distributed computing environment
AU1665802A (en) * 2000-11-16 2002-05-27 Pershing Division Of Donaldson System and method for application-level security
US20020147803A1 (en) * 2001-01-31 2002-10-10 Dodd Timothy David Method and system for calculating risk in association with a security audit of a computer network
US20030028803A1 (en) * 2001-05-18 2003-02-06 Bunker Nelson Waldo Network vulnerability assessment system and method
US7237264B1 (en) * 2001-06-04 2007-06-26 Internet Security Systems, Inc. System and method for preventing network misuse
US7146642B1 (en) * 2001-06-29 2006-12-05 Mcafee, Inc. System, method and computer program product for detecting modifications to risk assessment scanning caused by an intermediate device
US8001594B2 (en) * 2001-07-30 2011-08-16 Ipass, Inc. Monitoring computer network security enforcement
US20030172291A1 (en) * 2002-03-08 2003-09-11 Paul Judge Systems and methods for automated whitelisting in monitored communications
US7124438B2 (en) * 2002-03-08 2006-10-17 Ciphertrust, Inc. Systems and methods for anomaly detection in patterns of monitored communications
US6941467B2 (en) * 2002-03-08 2005-09-06 Ciphertrust, Inc. Systems and methods for adaptive message interrogation through multiple queues
US20030200142A1 (en) * 2002-04-23 2003-10-23 Heather Hicks On-line employee incentive system
US7437760B2 (en) * 2002-10-10 2008-10-14 International Business Machines Corporation Antiviral network system
US20040230453A1 (en) * 2003-05-16 2004-11-18 Belmore Charles Edward Method for measuring contract quality/risk
US7269757B2 (en) * 2003-07-11 2007-09-11 Reflectent Software, Inc. Distributed computer monitoring system and methods for autonomous computer management
US8412601B2 (en) * 2004-05-28 2013-04-02 Bank Of America Corporation Method and system to evaluate anti-money laundering risk
US20080052231A1 (en) * 2006-08-22 2008-02-28 Mark Moscal Transaction system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6405318B1 (en) * 1999-03-12 2002-06-11 Psionic Software, Inc. Intrusion detection system
US20040034794A1 (en) * 2000-05-28 2004-02-19 Yaron Mayer System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
US6546493B1 (en) * 2001-11-30 2003-04-08 Networks Associates Technology, Inc. System, method and computer program product for risk assessment scanning based on detected anomalous events
US20030154393A1 (en) * 2002-02-12 2003-08-14 Carl Young Automated security management

Also Published As

Publication number Publication date
AU2005275524B2 (en) 2010-09-09
EP1769618A2 (en) 2007-04-04
KR20070065306A (en) 2007-06-22
IL180821A0 (en) 2007-06-03
WO2006019513A2 (en) 2006-02-23
US7490356B2 (en) 2009-02-10
US20060020814A1 (en) 2006-01-26
US7865958B2 (en) 2011-01-04
CA2574483A1 (en) 2006-02-23
AU2005275524A1 (en) 2006-02-23
HK1107881A1 (en) 2008-04-18
JP2008507757A (en) 2008-03-13
EP1769618B1 (en) 2012-11-21
US20090178142A1 (en) 2009-07-09

Similar Documents

Publication Publication Date Title
WO2006019513A3 (en) End user risk management
Dubois et al. Competency-based or a traditional approach to training
WO2006115595A3 (en) System, method and computer program product for applying electronic policies
WO2008036275A3 (en) Dynamically adaptive scheduling system
WO2004031886A3 (en) Interactive benchmarking system
AU2003202119A1 (en) Providing human performance management data and insight
WO2007016129A3 (en) Dynamic content devlopment based on user feedback
WO2003069427A3 (en) Caloric management system and method with voice recognition
AU2003226220A1 (en) Using disassociated images for computer and storage resource management
WO2003077116A3 (en) System management controller negotiation protocol
WO2007022513A3 (en) Software architecture for displaying information content from plug-in modules in a user interface
WO2009140601A3 (en) Genetic marker weight management
WO2006104933A3 (en) Heterogeneous content channel manager for ubiquitous computer software systems
WO2009131863A8 (en) Composite assets for use in multiple simulation environments
WO2006081013A3 (en) System and method of managing content
WO2004061629A3 (en) Privileged-based qualification of branch trace store data
WO2008116108A3 (en) Non-invasive human-health-measurement system and method
GB0301777D0 (en) Improvements in and relating to computer operating system data management
WO2005013627A3 (en) Compliance rules for dynamic bidding
AU2001227589A1 (en) Large-scale network management using distributed autonomous agents
WO2007025211A3 (en) Methods and systems for ranking and investing in financial instruments
CA2493897A1 (en) Distributed contact information management
WO2003046718A3 (en) A system to provide an individual data processing environment
AU2002337784A1 (en) Portable business information content and management system
Moss et al. WEBSITES AND SERVICES BRANDING: IMPLICATIONS OF UNIVERSITIES’WEBSITES FOR INTERNAL AND EXTERNAL COMMUNICATION

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2005762383

Country of ref document: EP

Ref document number: 2574483

Country of ref document: CA

Ref document number: 2007522513

Country of ref document: JP

Ref document number: 2005275524

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: 180821

Country of ref document: IL

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 409/KOLNP/2007

Country of ref document: IN

ENP Entry into the national phase

Ref document number: 2005275524

Country of ref document: AU

Date of ref document: 20050623

Kind code of ref document: A

WWP Wipo information: published in national office

Ref document number: 2005275524

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: 1020077003763

Country of ref document: KR

WWP Wipo information: published in national office

Ref document number: 2005762383

Country of ref document: EP