WO2006019513A3 - End user risk management - Google Patents
End user risk management Download PDFInfo
- Publication number
- WO2006019513A3 WO2006019513A3 PCT/US2005/022352 US2005022352W WO2006019513A3 WO 2006019513 A3 WO2006019513 A3 WO 2006019513A3 US 2005022352 W US2005022352 W US 2005022352W WO 2006019513 A3 WO2006019513 A3 WO 2006019513A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- end user
- risks
- risk management
- user risk
- risk
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Abstract
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002574483A CA2574483A1 (en) | 2004-07-20 | 2005-06-23 | End user risk management |
AU2005275524A AU2005275524B2 (en) | 2004-07-20 | 2005-06-23 | End user risk management |
EP05762383A EP1769618B1 (en) | 2004-07-20 | 2005-06-23 | End user risk management |
JP2007522513A JP2008507757A (en) | 2004-07-20 | 2005-06-23 | End user risk management |
IL180821A IL180821A0 (en) | 2004-07-20 | 2007-01-21 | End user risk management |
HK07110792.2A HK1107881A1 (en) | 2004-07-20 | 2007-10-04 | End user risk management |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/894,714 US7490356B2 (en) | 2004-07-20 | 2004-07-20 | End user risk management |
US10/894,714 | 2004-07-20 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2006019513A2 WO2006019513A2 (en) | 2006-02-23 |
WO2006019513A3 true WO2006019513A3 (en) | 2006-04-06 |
Family
ID=35414786
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2005/022352 WO2006019513A2 (en) | 2004-07-20 | 2005-06-23 | End user risk management |
Country Status (9)
Country | Link |
---|---|
US (2) | US7490356B2 (en) |
EP (1) | EP1769618B1 (en) |
JP (1) | JP2008507757A (en) |
KR (1) | KR20070065306A (en) |
AU (1) | AU2005275524B2 (en) |
CA (1) | CA2574483A1 (en) |
HK (1) | HK1107881A1 (en) |
IL (1) | IL180821A0 (en) |
WO (1) | WO2006019513A2 (en) |
Families Citing this family (292)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080004922A1 (en) * | 1997-01-06 | 2008-01-03 | Jeff Scott Eder | Detailed method of and system for modeling and analyzing business improvement programs |
US10839321B2 (en) * | 1997-01-06 | 2020-11-17 | Jeffrey Eder | Automated data storage system |
US20040236673A1 (en) * | 2000-10-17 | 2004-11-25 | Eder Jeff Scott | Collaborative risk transfer system |
US20040215522A1 (en) * | 2001-12-26 | 2004-10-28 | Eder Jeff Scott | Process optimization system |
US20110040631A1 (en) * | 2005-07-09 | 2011-02-17 | Jeffrey Scott Eder | Personalized commerce system |
US9710852B1 (en) | 2002-05-30 | 2017-07-18 | Consumerinfo.Com, Inc. | Credit report timeline user interface |
US8417678B2 (en) | 2002-07-30 | 2013-04-09 | Storediq, Inc. | System, method and apparatus for enterprise policy management |
US7610329B2 (en) | 2002-07-30 | 2009-10-27 | Storediq, Inc. | Method and apparatus for managing file systems and file-based data storage |
US8612404B2 (en) * | 2002-07-30 | 2013-12-17 | Stored Iq, Inc. | Harvesting file system metsdata |
US7437760B2 (en) * | 2002-10-10 | 2008-10-14 | International Business Machines Corporation | Antiviral network system |
US7370212B2 (en) | 2003-02-25 | 2008-05-06 | Microsoft Corporation | Issuing a publisher use license off-line in a digital rights management (DRM) system |
US7761569B2 (en) | 2004-01-23 | 2010-07-20 | Tiversa, Inc. | Method for monitoring and providing information over a peer to peer network |
US20060242406A1 (en) * | 2005-04-22 | 2006-10-26 | Microsoft Corporation | Protected computing environment |
US8347078B2 (en) * | 2004-10-18 | 2013-01-01 | Microsoft Corporation | Device certificate individualization |
US20060089917A1 (en) * | 2004-10-22 | 2006-04-27 | Microsoft Corporation | License synchronization |
US8510331B1 (en) * | 2004-10-28 | 2013-08-13 | Storediq, Inc. | System and method for a desktop agent for use in managing file systems |
US20060101518A1 (en) * | 2004-11-05 | 2006-05-11 | Schumaker Troy T | Method to generate a quantitative measurement of computer security vulnerabilities |
US8464348B2 (en) * | 2004-11-15 | 2013-06-11 | Microsoft Corporation | Isolated computing environment anchored into CPU and motherboard |
US8336085B2 (en) * | 2004-11-15 | 2012-12-18 | Microsoft Corporation | Tuning product policy using observed evidence of customer behavior |
US8176564B2 (en) * | 2004-11-15 | 2012-05-08 | Microsoft Corporation | Special PC mode entered upon detection of undesired state |
US20060106920A1 (en) * | 2004-11-15 | 2006-05-18 | Microsoft Corporation | Method and apparatus for dynamically activating/deactivating an operating system |
US7716300B2 (en) * | 2005-02-22 | 2010-05-11 | Microsoft Corporation | Systems and methods to facilitate self regulation of social networks through trading and gift exchange |
US8438645B2 (en) | 2005-04-27 | 2013-05-07 | Microsoft Corporation | Secure clock with grace periods |
US8725646B2 (en) | 2005-04-15 | 2014-05-13 | Microsoft Corporation | Output protection levels |
US9436804B2 (en) | 2005-04-22 | 2016-09-06 | Microsoft Technology Licensing, Llc | Establishing a unique session key using a hardware functionality scan |
US9363481B2 (en) | 2005-04-22 | 2016-06-07 | Microsoft Technology Licensing, Llc | Protected media pipeline |
US20060265374A1 (en) * | 2005-05-19 | 2006-11-23 | Smith Thomas W | Multipurpose database |
US20060265758A1 (en) | 2005-05-20 | 2006-11-23 | Microsoft Corporation | Extensible media rights |
US8578500B2 (en) * | 2005-05-31 | 2013-11-05 | Kurt James Long | System and method of fraud and misuse detection |
US8353046B2 (en) * | 2005-06-08 | 2013-01-08 | Microsoft Corporation | System and method for delivery of a modular operating system |
GB0512744D0 (en) * | 2005-06-22 | 2005-07-27 | Blackspider Technologies | Method and system for filtering electronic messages |
CN101305375A (en) * | 2005-09-12 | 2008-11-12 | 沙盒技术有限公司 | System and method for controlling distribution of electronic information |
US7712132B1 (en) | 2005-10-06 | 2010-05-04 | Ogilvie John W | Detecting surreptitious spyware |
US20070150599A1 (en) * | 2005-12-22 | 2007-06-28 | International Business Machines Corporation | Generation of resource-usage profiles for application sessions of a number of client computing devices |
US9942271B2 (en) * | 2005-12-29 | 2018-04-10 | Nextlabs, Inc. | Information management system with two or more interactive enforcement points |
US7917532B1 (en) * | 2005-12-30 | 2011-03-29 | United Services Automobile Association (Usaa) | System for tracking data shared with external entities |
US8307427B1 (en) | 2005-12-30 | 2012-11-06 | United Services (USAA) Automobile Association | System for tracking data shared with external entities |
US8280805B1 (en) | 2006-01-10 | 2012-10-02 | Sas Institute Inc. | Computer-implemented risk evaluation systems and methods |
US7912773B1 (en) * | 2006-03-24 | 2011-03-22 | Sas Institute Inc. | Computer-implemented data storage systems and methods for use with predictive model systems |
CN1835014A (en) * | 2006-03-28 | 2006-09-20 | 阿里巴巴公司 | Method and system of monitoring on-line service risk |
US20080047017A1 (en) * | 2006-06-23 | 2008-02-21 | Martin Renaud | System and method for dynamically assessing security risks attributed to a computer user's behavior |
US8255517B1 (en) * | 2006-06-29 | 2012-08-28 | Symantec Corporation | Method and apparatus to determine device mobility history |
US8149849B2 (en) * | 2006-08-31 | 2012-04-03 | Sony Ericsson Mobile Communications Ab | Zigbee/IP gateway |
US8056134B1 (en) | 2006-09-10 | 2011-11-08 | Ogilvie John W | Malware detection and identification via malware spoofing |
CA2668881C (en) | 2006-11-07 | 2016-07-26 | Tiversa, Inc. | System and method for enhanced experience with a peer to peer network |
US9396328B2 (en) * | 2007-01-11 | 2016-07-19 | Symantec Corporation | Determining a contributing entity for a window |
US20080184026A1 (en) * | 2007-01-29 | 2008-07-31 | Hall Martin H | Metered Personal Computer Lifecycle |
CN101622849B (en) * | 2007-02-02 | 2014-06-11 | 网圣公司 | System and method for adding context to prevent data leakage over a computer network |
US8190512B1 (en) | 2007-02-20 | 2012-05-29 | Sas Institute Inc. | Computer-implemented clustering systems and methods for action determination |
US8346691B1 (en) | 2007-02-20 | 2013-01-01 | Sas Institute Inc. | Computer-implemented semi-supervised learning systems and methods |
US20080201780A1 (en) * | 2007-02-20 | 2008-08-21 | Microsoft Corporation | Risk-Based Vulnerability Assessment, Remediation and Network Access Protection |
US8015133B1 (en) | 2007-02-20 | 2011-09-06 | Sas Institute Inc. | Computer-implemented modeling systems and methods for analyzing and predicting computer network intrusions |
US8285656B1 (en) | 2007-03-30 | 2012-10-09 | Consumerinfo.Com, Inc. | Systems and methods for data verification |
CN105321108B (en) * | 2007-04-12 | 2019-10-18 | 克罗尔信息保证有限责任公司 | A kind of system and method for creating list of shared information over a peer-to-peer |
US8996681B2 (en) * | 2007-04-23 | 2015-03-31 | The Mitre Corporation | Passively attributing anonymous network events to their associated users |
US8707431B2 (en) * | 2007-04-24 | 2014-04-22 | The Mitre Corporation | Insider threat detection |
US20080288330A1 (en) * | 2007-05-14 | 2008-11-20 | Sailpoint Technologies, Inc. | System and method for user access risk scoring |
JP5112751B2 (en) * | 2007-06-05 | 2013-01-09 | 株式会社日立ソリューションズ | Self-inspection system for security measures |
BRPI0813820A2 (en) * | 2007-06-11 | 2015-01-06 | Tiversa Inc | SYSTEM AND METHOD FOR ADVERTISING IN A Peer-to-Peer Network. |
US20090019170A1 (en) * | 2007-07-09 | 2009-01-15 | Felix Immanuel Wyss | System and method for secure communication configuration |
US8959624B2 (en) * | 2007-10-31 | 2015-02-17 | Bank Of America Corporation | Executable download tracking system |
US8122510B2 (en) * | 2007-11-14 | 2012-02-21 | Bank Of America Corporation | Method for analyzing and managing unstructured data |
US8875259B2 (en) * | 2007-11-15 | 2014-10-28 | Salesforce.Com, Inc. | On-demand service security system and method for managing a risk of access as a condition of permitting access to the on-demand service |
US7890357B2 (en) * | 2007-11-20 | 2011-02-15 | Hartford Fire Insurance Company | System and method for identifying and evaluating nanomaterial-related risk |
US8862622B2 (en) * | 2007-12-10 | 2014-10-14 | Sprylogics International Corp. | Analysis, inference, and visualization of social networks |
US8528094B1 (en) * | 2007-12-14 | 2013-09-03 | Bank Of America Corporation | Automated information association and reporting |
US9990674B1 (en) | 2007-12-14 | 2018-06-05 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US8127986B1 (en) | 2007-12-14 | 2012-03-06 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US8370948B2 (en) * | 2008-03-19 | 2013-02-05 | Websense, Inc. | System and method for analysis of electronic information dissemination events |
US9130986B2 (en) * | 2008-03-19 | 2015-09-08 | Websense, Inc. | Method and system for protection against information stealing software |
US8407784B2 (en) * | 2008-03-19 | 2013-03-26 | Websense, Inc. | Method and system for protection against information stealing software |
US9015842B2 (en) | 2008-03-19 | 2015-04-21 | Websense, Inc. | Method and system for protection against information stealing software |
US20090265755A1 (en) * | 2008-04-18 | 2009-10-22 | International Business Machines Corporation | Firewall methodologies for use within virtual environments |
US8515862B2 (en) | 2008-05-29 | 2013-08-20 | Sas Institute Inc. | Computer-implemented systems and methods for integrated model validation for compliance and credit risk |
US8312033B1 (en) | 2008-06-26 | 2012-11-13 | Experian Marketing Solutions, Inc. | Systems and methods for providing an integrated identifier |
US8204180B1 (en) * | 2008-08-08 | 2012-06-19 | Intervoice Limited Partnership | Systems and methods for preventing sensitive information from being communicated into a non-secure environment |
US9256904B1 (en) | 2008-08-14 | 2016-02-09 | Experian Information Solutions, Inc. | Multi-bureau credit file freeze and unfreeze |
US9495538B2 (en) * | 2008-09-25 | 2016-11-15 | Symantec Corporation | Graduated enforcement of restrictions according to an application's reputation |
US8353021B1 (en) | 2008-09-30 | 2013-01-08 | Symantec Corporation | Determining firewall rules for an application on a client based on firewall rules and reputations of other clients |
US8060424B2 (en) | 2008-11-05 | 2011-11-15 | Consumerinfo.Com, Inc. | On-line method and system for monitoring and reporting unused available credit |
US8326987B2 (en) * | 2008-11-12 | 2012-12-04 | Lin Yeejang James | Method for adaptively building a baseline behavior model |
US20100125911A1 (en) * | 2008-11-17 | 2010-05-20 | Prakash Bhaskaran | Risk Scoring Based On Endpoint User Activities |
US8904540B1 (en) * | 2008-12-17 | 2014-12-02 | Symantec Corporation | Method and apparatus for evaluating hygiene of a computer |
US8275899B2 (en) * | 2008-12-29 | 2012-09-25 | At&T Intellectual Property I, L.P. | Methods, devices and computer program products for regulating network activity using a subscriber scoring system |
US8407194B1 (en) * | 2009-01-15 | 2013-03-26 | Privity Systems Inc. | Data classification and privacy repository |
US8112546B2 (en) * | 2009-02-13 | 2012-02-07 | Microsoft Corporation | Routing users to receive online services based on online behavior |
US9275231B1 (en) * | 2009-03-10 | 2016-03-01 | Symantec Corporation | Method and apparatus for securing a computer using an optimal configuration for security software based on user behavior |
US8495384B1 (en) * | 2009-03-10 | 2013-07-23 | James DeLuccia | Data comparison system |
US8392379B2 (en) * | 2009-03-17 | 2013-03-05 | Sophos Plc | Method and system for preemptive scanning of computer files |
US8239953B1 (en) | 2009-03-26 | 2012-08-07 | Symantec Corporation | Applying differing security policies for users who contribute differently to machine hygiene |
US8555391B1 (en) | 2009-04-25 | 2013-10-08 | Dasient, Inc. | Adaptive scanning |
US8683584B1 (en) * | 2009-04-25 | 2014-03-25 | Dasient, Inc. | Risk assessment |
US8516590B1 (en) | 2009-04-25 | 2013-08-20 | Dasient, Inc. | Malicious advertisement detection and remediation |
US8370938B1 (en) | 2009-04-25 | 2013-02-05 | Dasient, Inc. | Mitigating malware |
WO2010138466A1 (en) | 2009-05-26 | 2010-12-02 | Wabsense, Inc. | Systems and methods for efficeint detection of fingerprinted data and information |
US8752180B2 (en) * | 2009-05-26 | 2014-06-10 | Symantec Corporation | Behavioral engine for identifying patterns of confidential data use |
US8312543B1 (en) | 2009-06-30 | 2012-11-13 | Symantec Corporation | Using URL reputation data to selectively block cookies |
US8478708B1 (en) * | 2009-07-30 | 2013-07-02 | Zscaler, Inc. | System and method for determining risk posed by a web user |
US8566932B1 (en) | 2009-07-31 | 2013-10-22 | Symantec Corporation | Enforcing good network hygiene using reputation-based automatic remediation |
CN102014145A (en) * | 2009-09-04 | 2011-04-13 | 鸿富锦精密工业(深圳)有限公司 | File transfer security control system and method |
US9742778B2 (en) * | 2009-09-09 | 2017-08-22 | International Business Machines Corporation | Differential security policies in email systems |
TWI464615B (en) * | 2009-09-14 | 2014-12-11 | Hon Hai Prec Ind Co Ltd | System and Method for Controlling File Transfer |
US9009834B1 (en) * | 2009-09-24 | 2015-04-14 | Google Inc. | System policy violation detection |
US7917593B1 (en) * | 2009-10-23 | 2011-03-29 | Symantec Corporation | Method and system for employing automatic reply systems to detect e-mail scammer IP addresses |
US7917655B1 (en) * | 2009-10-23 | 2011-03-29 | Symantec Corporation | Method and system for employing phone number analysis to detect and prevent spam and e-mail scams |
US8776168B1 (en) * | 2009-10-29 | 2014-07-08 | Symantec Corporation | Applying security policy based on behaviorally-derived user risk profiles |
US8805737B1 (en) * | 2009-11-02 | 2014-08-12 | Sas Institute Inc. | Computer-implemented multiple entity dynamic summarization systems and methods |
US10282702B2 (en) * | 2010-01-04 | 2019-05-07 | Bank Of America Corporation | Dynamic employee security risk scoring |
WO2011082489A1 (en) * | 2010-01-06 | 2011-07-14 | Vitrium Systems Inc. | Method and system of providing a viewing experience with respect to a document having read-only content |
US8255572B1 (en) * | 2010-01-22 | 2012-08-28 | Symantec Corporation | Method and system to detect and prevent e-mail scams |
US8800034B2 (en) | 2010-01-26 | 2014-08-05 | Bank Of America Corporation | Insider threat correlation tool |
US9038187B2 (en) * | 2010-01-26 | 2015-05-19 | Bank Of America Corporation | Insider threat correlation tool |
US8782209B2 (en) * | 2010-01-26 | 2014-07-15 | Bank Of America Corporation | Insider threat correlation tool |
US8793789B2 (en) | 2010-07-22 | 2014-07-29 | Bank Of America Corporation | Insider threat correlation tool |
US8769373B2 (en) | 2010-03-22 | 2014-07-01 | Cleon L. Rogers, JR. | Method of identifying and protecting the integrity of a set of source data |
US9652802B1 (en) | 2010-03-24 | 2017-05-16 | Consumerinfo.Com, Inc. | Indirect monitoring and reporting of a user's credit data |
US9619652B2 (en) * | 2010-03-31 | 2017-04-11 | Salesforce.Com, Inc. | System, method and computer program product for determining a risk score for an entity |
US8782794B2 (en) | 2010-04-16 | 2014-07-15 | Bank Of America Corporation | Detecting secure or encrypted tunneling in a computer network |
US8417996B2 (en) * | 2010-04-19 | 2013-04-09 | International Business Machines Corporation | Facade for business risk minimization in change administration via risk estimation and mistake identification by ticket analysis |
WO2011153617A2 (en) * | 2010-06-09 | 2011-12-15 | Pravala Inc. | Reducing load at a proxy server |
US8566956B2 (en) * | 2010-06-23 | 2013-10-22 | Salesforce.Com, Inc. | Monitoring and reporting of data access behavior of authorized database users |
US8744956B1 (en) | 2010-07-01 | 2014-06-03 | Experian Information Solutions, Inc. | Systems and methods for permission arbitrated transaction services |
US8931058B2 (en) | 2010-07-01 | 2015-01-06 | Experian Information Solutions, Inc. | Systems and methods for permission arbitrated transaction services |
US9406048B2 (en) * | 2010-07-07 | 2016-08-02 | Mark Meister | Email system for preventing inadvertant transmission of propriety message or documents to unintended recipient |
US8826444B1 (en) * | 2010-07-09 | 2014-09-02 | Symantec Corporation | Systems and methods for using client reputation data to classify web domains |
US8930262B1 (en) | 2010-11-02 | 2015-01-06 | Experian Technology Ltd. | Systems and methods of assisted strategy design |
US9147042B1 (en) | 2010-11-22 | 2015-09-29 | Experian Information Solutions, Inc. | Systems and methods for data verification |
US8516597B1 (en) * | 2010-12-02 | 2013-08-20 | Symantec Corporation | Method to calculate a risk score of a folder that has been scanned for confidential information |
US9094291B1 (en) | 2010-12-14 | 2015-07-28 | Symantec Corporation | Partial risk score calculation for a data object |
US9129257B2 (en) * | 2010-12-20 | 2015-09-08 | Verizon Patent And Licensing Inc. | Method and system for monitoring high risk users |
US8782782B1 (en) * | 2010-12-23 | 2014-07-15 | Emc Corporation | Computer system with risk-based assessment and protection against harmful user activity |
US8806591B2 (en) * | 2011-01-07 | 2014-08-12 | Verizon Patent And Licensing Inc. | Authentication risk evaluation |
US9235728B2 (en) | 2011-02-18 | 2016-01-12 | Csidentity Corporation | System and methods for identifying compromised personally identifiable information on the internet |
US8560722B2 (en) * | 2011-03-18 | 2013-10-15 | International Business Machines Corporation | System and method to govern sensitive data exchange with mobile devices based on threshold sensitivity values |
US9122877B2 (en) | 2011-03-21 | 2015-09-01 | Mcafee, Inc. | System and method for malware and network reputation correlation |
US9065799B2 (en) * | 2011-04-15 | 2015-06-23 | Lockheed Martin Corporation | Method and apparatus for cyber security |
US8914545B2 (en) * | 2011-04-27 | 2014-12-16 | Iii Holdings 1, Llc | Systems and methods for lossless compression of data and high speed manipulation thereof |
US9558519B1 (en) | 2011-04-29 | 2017-01-31 | Consumerinfo.Com, Inc. | Exposing reporting cycle information |
US9665854B1 (en) | 2011-06-16 | 2017-05-30 | Consumerinfo.Com, Inc. | Authentication alerts |
US9106680B2 (en) | 2011-06-27 | 2015-08-11 | Mcafee, Inc. | System and method for protocol fingerprinting and reputation correlation |
US9239908B1 (en) * | 2011-06-29 | 2016-01-19 | Emc Corporation | Managing organization based security risks |
US8099596B1 (en) * | 2011-06-30 | 2012-01-17 | Kaspersky Lab Zao | System and method for malware protection using virtualization |
US9483606B1 (en) | 2011-07-08 | 2016-11-01 | Consumerinfo.Com, Inc. | Lifescore |
US20130018921A1 (en) * | 2011-07-13 | 2013-01-17 | International Business Machines Corporation | Need-to-know information access using quantified risk |
US8726379B1 (en) * | 2011-07-15 | 2014-05-13 | Norse Corporation | Systems and methods for dynamic protection from electronic attacks |
US20150193226A1 (en) * | 2011-08-10 | 2015-07-09 | Interactive TKO, Inc. | Instrumentation agent for manipulating component responses |
US8881258B2 (en) | 2011-08-24 | 2014-11-04 | Mcafee, Inc. | System, method, and computer program for preventing infections from spreading in a network environment using dynamic application of a firewall policy |
US9106691B1 (en) | 2011-09-16 | 2015-08-11 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US8869241B2 (en) * | 2011-09-24 | 2014-10-21 | Elwha Llc | Network acquired behavioral fingerprint for authentication |
US9825967B2 (en) | 2011-09-24 | 2017-11-21 | Elwha Llc | Behavioral fingerprinting via social networking interaction |
US9729549B2 (en) | 2011-09-24 | 2017-08-08 | Elwha Llc | Behavioral fingerprinting with adaptive development |
US9348985B2 (en) | 2011-11-23 | 2016-05-24 | Elwha Llc | Behavioral fingerprint controlled automatic task determination |
US9621404B2 (en) | 2011-09-24 | 2017-04-11 | Elwha Llc | Behavioral fingerprinting with social networking |
US9298900B2 (en) | 2011-09-24 | 2016-03-29 | Elwha Llc | Behavioral fingerprinting via inferred personal relation |
US9015860B2 (en) | 2011-09-24 | 2015-04-21 | Elwha Llc | Behavioral fingerprinting via derived personal relation |
US8688980B2 (en) | 2011-09-24 | 2014-04-01 | Elwha Llc | Trust verification schema based transaction authorization |
US8713704B2 (en) | 2011-09-24 | 2014-04-29 | Elwha Llc | Behavioral fingerprint based authentication |
US9083687B2 (en) | 2011-09-24 | 2015-07-14 | Elwha Llc | Multi-device behavioral fingerprinting |
US8739290B1 (en) * | 2011-09-29 | 2014-05-27 | Emc Corporation | Generating alerts in event management systems |
US8706648B2 (en) * | 2011-10-03 | 2014-04-22 | International Business Machines Corporation | Assessing social risk due to exposure from linked contacts |
US8712921B2 (en) * | 2011-10-03 | 2014-04-29 | International Business Machines Corporation | Receiving security risk feedback from linked contacts due to a user's system actions and behaviors |
US8738516B1 (en) | 2011-10-13 | 2014-05-27 | Consumerinfo.Com, Inc. | Debt services candidate locator |
US8768866B2 (en) | 2011-10-21 | 2014-07-01 | Sas Institute Inc. | Computer-implemented systems and methods for forecasting and estimation using grid regression |
US8832840B2 (en) * | 2011-10-26 | 2014-09-09 | Verizon Patent And Licensing Inc. | Mobile application security and management service |
US11030562B1 (en) * | 2011-10-31 | 2021-06-08 | Consumerinfo.Com, Inc. | Pre-data breach monitoring |
US9009334B1 (en) * | 2011-12-09 | 2015-04-14 | Amazon Technologies, Inc. | Remote browsing session management |
US8484741B1 (en) | 2012-01-27 | 2013-07-09 | Chapman Technology Group, Inc. | Software service to facilitate organizational testing of employees to determine their potential susceptibility to phishing scams |
US8931043B2 (en) * | 2012-04-10 | 2015-01-06 | Mcafee Inc. | System and method for determining and using local reputations of users and hosts to protect information in a network environment |
US9853959B1 (en) | 2012-05-07 | 2017-12-26 | Consumerinfo.Com, Inc. | Storage and maintenance of personal data |
US9043903B2 (en) | 2012-06-08 | 2015-05-26 | Crowdstrike, Inc. | Kernel-level security agent |
US8775206B2 (en) * | 2012-06-26 | 2014-07-08 | Amit Kulkarni | Healthcare privacy violation detection and investigation system and method |
US9639678B2 (en) | 2012-06-29 | 2017-05-02 | Microsoft Technology Licensing, Llc | Identity risk score generation and implementation |
US9292881B2 (en) | 2012-06-29 | 2016-03-22 | Crowdstrike, Inc. | Social sharing of security information in a group |
US9213827B2 (en) | 2012-09-27 | 2015-12-15 | Intel Corporation | Security data aggregation and business intelligence for web applications |
US20140137190A1 (en) * | 2012-11-09 | 2014-05-15 | Rapid7, Inc. | Methods and systems for passively detecting security levels in client devices |
US9654541B1 (en) | 2012-11-12 | 2017-05-16 | Consumerinfo.Com, Inc. | Aggregating user web browsing data |
US8856894B1 (en) | 2012-11-28 | 2014-10-07 | Consumerinfo.Com, Inc. | Always on authentication |
US9241259B2 (en) | 2012-11-30 | 2016-01-19 | Websense, Inc. | Method and apparatus for managing the transfer of sensitive information to mobile devices |
US9916621B1 (en) | 2012-11-30 | 2018-03-13 | Consumerinfo.Com, Inc. | Presentation of credit score factors |
US10255598B1 (en) | 2012-12-06 | 2019-04-09 | Consumerinfo.Com, Inc. | Credit card account data extraction |
US8839449B1 (en) * | 2012-12-19 | 2014-09-16 | Emc Corporation | Assessing risk of information leakage |
US9398038B2 (en) | 2013-02-08 | 2016-07-19 | PhishMe, Inc. | Collaborative phishing attack detection |
US9053326B2 (en) | 2013-02-08 | 2015-06-09 | PhishMe, Inc. | Simulated phishing attack with sequential messages |
US9356948B2 (en) | 2013-02-08 | 2016-05-31 | PhishMe, Inc. | Collaborative phishing attack detection |
US9253207B2 (en) | 2013-02-08 | 2016-02-02 | PhishMe, Inc. | Collaborative phishing attack detection |
US8966637B2 (en) | 2013-02-08 | 2015-02-24 | PhishMe, Inc. | Performance benchmarking for simulated phishing attacks |
US9697263B1 (en) | 2013-03-04 | 2017-07-04 | Experian Information Solutions, Inc. | Consumer data request fulfillment system |
US10102570B1 (en) | 2013-03-14 | 2018-10-16 | Consumerinfo.Com, Inc. | Account vulnerability alerts |
US8812387B1 (en) | 2013-03-14 | 2014-08-19 | Csidentity Corporation | System and method for identifying related credit inquiries |
US9406085B1 (en) | 2013-03-14 | 2016-08-02 | Consumerinfo.Com, Inc. | System and methods for credit dispute processing, resolution, and reporting |
US9870589B1 (en) | 2013-03-14 | 2018-01-16 | Consumerinfo.Com, Inc. | Credit utilization tracking and reporting |
US9594907B2 (en) | 2013-03-14 | 2017-03-14 | Sas Institute Inc. | Unauthorized activity detection and classification |
US9231979B2 (en) | 2013-03-14 | 2016-01-05 | Sas Institute Inc. | Rule optimization for classification and detection |
US10664936B2 (en) | 2013-03-15 | 2020-05-26 | Csidentity Corporation | Authentication systems and methods for on-demand products |
US9633322B1 (en) | 2013-03-15 | 2017-04-25 | Consumerinfo.Com, Inc. | Adjustment of knowledge-based authentication |
US9202038B1 (en) * | 2013-04-08 | 2015-12-01 | Amazon Technologies, Inc. | Risk based authentication |
US10685398B1 (en) | 2013-04-23 | 2020-06-16 | Consumerinfo.Com, Inc. | Presenting credit score information |
US9264442B2 (en) * | 2013-04-26 | 2016-02-16 | Palo Alto Research Center Incorporated | Detecting anomalies in work practice data by combining multiple domains of information |
US9721147B1 (en) | 2013-05-23 | 2017-08-01 | Consumerinfo.Com, Inc. | Digital identity |
US9443268B1 (en) | 2013-08-16 | 2016-09-13 | Consumerinfo.Com, Inc. | Bill payment and reporting |
US10102536B1 (en) | 2013-11-15 | 2018-10-16 | Experian Information Solutions, Inc. | Micro-geographic aggregation system |
US10325314B1 (en) | 2013-11-15 | 2019-06-18 | Consumerinfo.Com, Inc. | Payment reporting systems |
US9477737B1 (en) | 2013-11-20 | 2016-10-25 | Consumerinfo.Com, Inc. | Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules |
US9529851B1 (en) | 2013-12-02 | 2016-12-27 | Experian Information Solutions, Inc. | Server architecture for electronic data quality processing |
US9613196B2 (en) * | 2013-12-19 | 2017-04-04 | Intel Corporation | Protection system including machine learning snapshot evaluation |
US9262629B2 (en) | 2014-01-21 | 2016-02-16 | PhishMe, Inc. | Methods and systems for preventing malicious use of phishing simulation records |
US10262362B1 (en) | 2014-02-14 | 2019-04-16 | Experian Information Solutions, Inc. | Automatic generation of code for attributes |
US10289405B2 (en) | 2014-03-20 | 2019-05-14 | Crowdstrike, Inc. | Integrity assurance and rebootless updating during runtime |
USD760256S1 (en) | 2014-03-25 | 2016-06-28 | Consumerinfo.Com, Inc. | Display screen or portion thereof with graphical user interface |
USD759689S1 (en) | 2014-03-25 | 2016-06-21 | Consumerinfo.Com, Inc. | Display screen or portion thereof with graphical user interface |
USD759690S1 (en) | 2014-03-25 | 2016-06-21 | Consumerinfo.Com, Inc. | Display screen or portion thereof with graphical user interface |
US9892457B1 (en) | 2014-04-16 | 2018-02-13 | Consumerinfo.Com, Inc. | Providing credit data in search results |
US10373240B1 (en) | 2014-04-25 | 2019-08-06 | Csidentity Corporation | Systems, methods and computer-program products for eligibility verification |
US20170103194A1 (en) * | 2014-05-30 | 2017-04-13 | Pcms Holdings, Inc. | Systems and methods for active authentication |
US9225695B1 (en) * | 2014-06-10 | 2015-12-29 | Lockheed Martin Corporation | Storing and transmitting sensitive data |
US10430789B1 (en) | 2014-06-10 | 2019-10-01 | Lockheed Martin Corporation | System, method and computer program product for secure retail transactions (SRT) |
US9697385B2 (en) | 2014-06-20 | 2017-07-04 | Google Inc. | Security adjustments in mobile devices |
US9942250B2 (en) | 2014-08-06 | 2018-04-10 | Norse Networks, Inc. | Network appliance for dynamic protection from risky network activities |
US9407655B2 (en) * | 2014-08-27 | 2016-08-02 | Bank Of America Corporation | Monitoring security risks to enterprise corresponding to access rights and access risk calculation |
US10162969B2 (en) * | 2014-09-10 | 2018-12-25 | Honeywell International Inc. | Dynamic quantification of cyber-security risks in a control system |
WO2016053261A1 (en) | 2014-09-29 | 2016-04-07 | Hewlett Packard Enterprise Development Lp | Detection of email-related vulnerabilities |
US20160104476A1 (en) | 2014-10-09 | 2016-04-14 | International Business Machines Corporation | Cognitive Security for Voice Phishing Activity |
CN107004087B (en) * | 2014-10-24 | 2021-04-27 | 迈克菲有限公司 | Proxy presence for self-healing |
WO2016070096A1 (en) | 2014-10-30 | 2016-05-06 | Sas Institute Inc. | Generating accurate reason codes with complex non-linear modeling and neural networks |
US10339527B1 (en) | 2014-10-31 | 2019-07-02 | Experian Information Solutions, Inc. | System and architecture for electronic fraud detection |
US11855768B2 (en) | 2014-12-29 | 2023-12-26 | Guidewire Software, Inc. | Disaster scenario based inferential analysis using feedback for extracting and combining cyber risk information |
WO2017078986A1 (en) | 2014-12-29 | 2017-05-11 | Cyence Inc. | Diversity analysis with actionable feedback methodologies |
US11863590B2 (en) | 2014-12-29 | 2024-01-02 | Guidewire Software, Inc. | Inferential analysis using feedback for extracting and combining cyber risk information |
US10050990B2 (en) | 2014-12-29 | 2018-08-14 | Guidewire Software, Inc. | Disaster scenario based inferential analysis using feedback for extracting and combining cyber risk information |
CA2975509A1 (en) | 2015-02-05 | 2016-08-11 | Phishline, Llc | Social engineering simulation workflow appliance |
USD814494S1 (en) | 2015-03-02 | 2018-04-03 | Norse Networks, Inc. | Computer display panel with an icon image of a live electronic threat intelligence visualization interface |
US10404748B2 (en) * | 2015-03-31 | 2019-09-03 | Guidewire Software, Inc. | Cyber risk analysis and remediation using network monitored sensors and methods of use |
US9906539B2 (en) | 2015-04-10 | 2018-02-27 | PhishMe, Inc. | Suspicious message processing and incident response |
USD810775S1 (en) | 2015-04-21 | 2018-02-20 | Norse Networks, Inc. | Computer display panel with a graphical live electronic threat intelligence visualization interface |
US10129220B2 (en) | 2015-06-13 | 2018-11-13 | Avocado Systems Inc. | Application and data protection tag |
US10270810B2 (en) | 2015-06-14 | 2019-04-23 | Avocado Systems Inc. | Data socket descriptor based policies for application and data behavior and security |
US10193889B2 (en) | 2015-06-14 | 2019-01-29 | Avocado Systems Inc. | Data socket descriptor attributes for application discovery in data centers |
US10397277B2 (en) | 2015-06-14 | 2019-08-27 | Avocado Systems Inc. | Dynamic data socket descriptor mirroring mechanism and use for security analytics |
US10148697B2 (en) | 2015-06-16 | 2018-12-04 | Avocado Systems Inc. | Unified host based security exchange between heterogeneous end point security agents |
US10193930B2 (en) * | 2015-06-29 | 2019-01-29 | Avocado Systems Inc. | Application security capability exchange via the application and data protection layer |
US9923914B2 (en) | 2015-06-30 | 2018-03-20 | Norse Networks, Inc. | Systems and platforms for intelligently monitoring risky network activities |
US11151468B1 (en) | 2015-07-02 | 2021-10-19 | Experian Information Solutions, Inc. | Behavior analysis using distributed representations of event data |
US10356068B2 (en) | 2015-07-14 | 2019-07-16 | Avocado Systems Inc. | Security key generator module for security sensitive applications |
US10339316B2 (en) | 2015-07-28 | 2019-07-02 | Crowdstrike, Inc. | Integrity assurance through early loading in the boot phase |
WO2017027029A1 (en) * | 2015-08-12 | 2017-02-16 | Hewlett Packard Enterprise Development Lp | Training a security scan classifier to learn an issue preference of a human auditor |
US10354070B2 (en) | 2015-08-22 | 2019-07-16 | Avocado Systems Inc. | Thread level access control to socket descriptors and end-to-end thread level policies for thread protection |
US10757154B1 (en) | 2015-11-24 | 2020-08-25 | Experian Information Solutions, Inc. | Real-time event-based notification system |
US10715544B2 (en) * | 2016-02-05 | 2020-07-14 | Sony Corporation | Method, apparatus and system for calculating a risk score of a user request by a user on a web application |
US10084809B1 (en) * | 2016-05-06 | 2018-09-25 | Wells Fargo Bank, N.A. | Enterprise security measures |
US9699305B1 (en) * | 2016-06-07 | 2017-07-04 | International Business Machines Corporation | Caller relationship and risk assessment |
US9973522B2 (en) * | 2016-07-08 | 2018-05-15 | Accenture Global Solutions Limited | Identifying network security risks |
US10839703B2 (en) * | 2016-12-30 | 2020-11-17 | Fortinet, Inc. | Proactive network security assessment based on benign variants of known threats |
US10581896B2 (en) | 2016-12-30 | 2020-03-03 | Chronicle Llc | Remedial actions based on user risk assessments |
CN110383319B (en) | 2017-01-31 | 2023-05-26 | 益百利信息解决方案公司 | Large scale heterogeneous data ingestion and user resolution |
US10387228B2 (en) | 2017-02-21 | 2019-08-20 | Crowdstrike, Inc. | Symmetric bridge component for communications between kernel mode and user mode |
US10230690B2 (en) * | 2017-03-23 | 2019-03-12 | International Business Machines Corporation | Digital media content distribution blocking |
RU2670030C2 (en) * | 2017-04-05 | 2018-10-17 | Общество С Ограниченной Ответственностью "Яндекс" | Methods and systems for determining non-standard user activity |
US10592837B2 (en) * | 2017-04-21 | 2020-03-17 | Accenture Global Solutions Limited | Identifying security risks via analysis of multi-level analytical records |
US20180316709A1 (en) * | 2017-04-28 | 2018-11-01 | NURO Secure Messaging Ltd. | System and method for detecting regulatory anomalies within electronic communication |
SG11201710238QA (en) * | 2017-06-29 | 2019-01-30 | Certis Cisco Security Pte Ltd | Autonomic incident triage prioritization by performance modifier and temporal decay parameters |
US10735183B1 (en) | 2017-06-30 | 2020-08-04 | Experian Information Solutions, Inc. | Symmetric encryption for private smart contracts among multiple parties in a private peer-to-peer network |
US10318729B2 (en) * | 2017-07-26 | 2019-06-11 | Forcepoint, LLC | Privacy protection during insider threat monitoring |
US10699028B1 (en) | 2017-09-28 | 2020-06-30 | Csidentity Corporation | Identity security architecture systems and methods |
US10896472B1 (en) | 2017-11-14 | 2021-01-19 | Csidentity Corporation | Security and identity verification system and architecture |
US10740459B2 (en) | 2017-12-28 | 2020-08-11 | Crowdstrike, Inc. | Kernel- and user-level cooperative security processing |
US11477219B2 (en) * | 2018-02-20 | 2022-10-18 | Darktrace Holdings Limited | Endpoint agent and system |
EP3785152A4 (en) * | 2018-04-27 | 2021-12-22 | Dcoya Ltd. | System and method for securing electronic correspondence |
US10911234B2 (en) | 2018-06-22 | 2021-02-02 | Experian Information Solutions, Inc. | System and method for a token gateway environment |
US11120122B2 (en) | 2018-07-18 | 2021-09-14 | International Business Machines Corporation | Augmenting password generation and validation |
CN109255518A (en) * | 2018-08-01 | 2019-01-22 | 阿里巴巴集团控股有限公司 | Data application risk appraisal procedure, device and system |
US11321467B2 (en) * | 2018-08-21 | 2022-05-03 | Beijing Didi Infinity Technology And Development Co., Ltd. | System and method for security analysis |
US20200067961A1 (en) * | 2018-08-21 | 2020-02-27 | Didi Research America, Llc | Data security risks evaluation for threat detection |
US10880313B2 (en) | 2018-09-05 | 2020-12-29 | Consumerinfo.Com, Inc. | Database platform for realtime updating of user data from third party sources |
US10963434B1 (en) | 2018-09-07 | 2021-03-30 | Experian Information Solutions, Inc. | Data architecture for supporting multiple search models |
US11315179B1 (en) | 2018-11-16 | 2022-04-26 | Consumerinfo.Com, Inc. | Methods and apparatuses for customized card recommendations |
US11023582B2 (en) * | 2018-12-19 | 2021-06-01 | EMC IP Holding Company LLC | Identification and control of malicious users on a data storage system |
CN110865774B (en) * | 2018-12-28 | 2023-08-08 | 安天科技集团股份有限公司 | Information security detection method and device for printing equipment |
WO2020146667A1 (en) | 2019-01-11 | 2020-07-16 | Experian Information Solutions, Inc. | Systems and methods for secure data aggregation and computation |
US11238656B1 (en) | 2019-02-22 | 2022-02-01 | Consumerinfo.Com, Inc. | System and method for an augmented reality experience via an artificial intelligence bot |
US11126746B2 (en) * | 2019-03-28 | 2021-09-21 | The Toronto-Dominion Bank | Dynamic security controls for data sharing between systems |
US10877866B2 (en) | 2019-05-09 | 2020-12-29 | International Business Machines Corporation | Diagnosing workload performance problems in computer servers |
US11165679B2 (en) | 2019-05-09 | 2021-11-02 | International Business Machines Corporation | Establishing consumed resource to consumer relationships in computer servers using micro-trend technology |
US11537668B2 (en) * | 2019-08-14 | 2022-12-27 | Proofpoint, Inc. | Using a machine learning system to process a corpus of documents associated with a user to determine a user-specific and/or process-specific consequence index |
US11941065B1 (en) | 2019-09-13 | 2024-03-26 | Experian Information Solutions, Inc. | Single identifier platform for storing entity data |
US11182269B2 (en) | 2019-10-01 | 2021-11-23 | International Business Machines Corporation | Proactive change verification |
US11586685B2 (en) | 2019-10-31 | 2023-02-21 | Citrix Systems, Inc. | Systems and methods for generating data structures from browser data to determine and initiate actions based thereon |
US11463467B2 (en) * | 2020-01-09 | 2022-10-04 | Kyndryl, Inc. | Advanced risk evaluation for servers |
US11531765B2 (en) * | 2020-07-16 | 2022-12-20 | Allstate Insurance Company | Dynamic system profiling based on data extraction |
US11880377B1 (en) | 2021-03-26 | 2024-01-23 | Experian Information Solutions, Inc. | Systems and methods for entity resolution |
WO2023026132A1 (en) * | 2021-08-25 | 2023-03-02 | Morphisec Information Security 2014 Ltd. | Continuous vulnerability assessment system |
WO2023175756A1 (en) * | 2022-03-16 | 2023-09-21 | 日本電信電話株式会社 | Policy control device, zero trust system, policy control method, and policy control program |
CN114896615B (en) * | 2022-05-19 | 2023-03-28 | 厦门智宇信息技术有限公司 | Data security access system based on big data |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6405318B1 (en) * | 1999-03-12 | 2002-06-11 | Psionic Software, Inc. | Intrusion detection system |
US6546493B1 (en) * | 2001-11-30 | 2003-04-08 | Networks Associates Technology, Inc. | System, method and computer program product for risk assessment scanning based on detected anomalous events |
US20030154393A1 (en) * | 2002-02-12 | 2003-08-14 | Carl Young | Automated security management |
US20040034794A1 (en) * | 2000-05-28 | 2004-02-19 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
Family Cites Families (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6219805B1 (en) * | 1998-09-15 | 2001-04-17 | Nortel Networks Limited | Method and system for dynamic risk assessment of software systems |
US6470319B1 (en) * | 1999-06-25 | 2002-10-22 | Community Corrections Improvement Association | Data processing system for determining case management plan for criminal offender |
US6912502B1 (en) * | 1999-12-30 | 2005-06-28 | Genworth Financial, Inc., | System and method for compliance management |
US7136860B2 (en) * | 2000-02-14 | 2006-11-14 | Overture Services, Inc. | System and method to determine the validity of an interaction on a network |
US6553377B1 (en) * | 2000-03-31 | 2003-04-22 | Network Associates, Inc. | System and process for maintaining a plurality of remote security applications using a modular framework in a distributed computing environment |
US6553378B1 (en) * | 2000-03-31 | 2003-04-22 | Network Associates, Inc. | System and process for reporting network events with a plurality of hierarchically-structured databases in a distributed computing environment |
AU1665802A (en) * | 2000-11-16 | 2002-05-27 | Pershing Division Of Donaldson | System and method for application-level security |
US20020147803A1 (en) * | 2001-01-31 | 2002-10-10 | Dodd Timothy David | Method and system for calculating risk in association with a security audit of a computer network |
US20030028803A1 (en) * | 2001-05-18 | 2003-02-06 | Bunker Nelson Waldo | Network vulnerability assessment system and method |
US7237264B1 (en) * | 2001-06-04 | 2007-06-26 | Internet Security Systems, Inc. | System and method for preventing network misuse |
US7146642B1 (en) * | 2001-06-29 | 2006-12-05 | Mcafee, Inc. | System, method and computer program product for detecting modifications to risk assessment scanning caused by an intermediate device |
US8001594B2 (en) * | 2001-07-30 | 2011-08-16 | Ipass, Inc. | Monitoring computer network security enforcement |
US20030172291A1 (en) * | 2002-03-08 | 2003-09-11 | Paul Judge | Systems and methods for automated whitelisting in monitored communications |
US7124438B2 (en) * | 2002-03-08 | 2006-10-17 | Ciphertrust, Inc. | Systems and methods for anomaly detection in patterns of monitored communications |
US6941467B2 (en) * | 2002-03-08 | 2005-09-06 | Ciphertrust, Inc. | Systems and methods for adaptive message interrogation through multiple queues |
US20030200142A1 (en) * | 2002-04-23 | 2003-10-23 | Heather Hicks | On-line employee incentive system |
US7437760B2 (en) * | 2002-10-10 | 2008-10-14 | International Business Machines Corporation | Antiviral network system |
US20040230453A1 (en) * | 2003-05-16 | 2004-11-18 | Belmore Charles Edward | Method for measuring contract quality/risk |
US7269757B2 (en) * | 2003-07-11 | 2007-09-11 | Reflectent Software, Inc. | Distributed computer monitoring system and methods for autonomous computer management |
US8412601B2 (en) * | 2004-05-28 | 2013-04-02 | Bank Of America Corporation | Method and system to evaluate anti-money laundering risk |
US20080052231A1 (en) * | 2006-08-22 | 2008-02-28 | Mark Moscal | Transaction system |
-
2004
- 2004-07-20 US US10/894,714 patent/US7490356B2/en active Active
-
2005
- 2005-06-23 EP EP05762383A patent/EP1769618B1/en active Active
- 2005-06-23 JP JP2007522513A patent/JP2008507757A/en not_active Withdrawn
- 2005-06-23 KR KR1020077003763A patent/KR20070065306A/en not_active Application Discontinuation
- 2005-06-23 AU AU2005275524A patent/AU2005275524B2/en not_active Ceased
- 2005-06-23 CA CA002574483A patent/CA2574483A1/en not_active Abandoned
- 2005-06-23 WO PCT/US2005/022352 patent/WO2006019513A2/en active Application Filing
-
2007
- 2007-01-21 IL IL180821A patent/IL180821A0/en unknown
- 2007-10-04 HK HK07110792.2A patent/HK1107881A1/en not_active IP Right Cessation
-
2009
- 2009-02-05 US US12/366,150 patent/US7865958B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6405318B1 (en) * | 1999-03-12 | 2002-06-11 | Psionic Software, Inc. | Intrusion detection system |
US20040034794A1 (en) * | 2000-05-28 | 2004-02-19 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
US6546493B1 (en) * | 2001-11-30 | 2003-04-08 | Networks Associates Technology, Inc. | System, method and computer program product for risk assessment scanning based on detected anomalous events |
US20030154393A1 (en) * | 2002-02-12 | 2003-08-14 | Carl Young | Automated security management |
Also Published As
Publication number | Publication date |
---|---|
AU2005275524B2 (en) | 2010-09-09 |
EP1769618A2 (en) | 2007-04-04 |
KR20070065306A (en) | 2007-06-22 |
IL180821A0 (en) | 2007-06-03 |
WO2006019513A2 (en) | 2006-02-23 |
US7490356B2 (en) | 2009-02-10 |
US20060020814A1 (en) | 2006-01-26 |
US7865958B2 (en) | 2011-01-04 |
CA2574483A1 (en) | 2006-02-23 |
AU2005275524A1 (en) | 2006-02-23 |
HK1107881A1 (en) | 2008-04-18 |
JP2008507757A (en) | 2008-03-13 |
EP1769618B1 (en) | 2012-11-21 |
US20090178142A1 (en) | 2009-07-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2006019513A3 (en) | End user risk management | |
Dubois et al. | Competency-based or a traditional approach to training | |
WO2006115595A3 (en) | System, method and computer program product for applying electronic policies | |
WO2008036275A3 (en) | Dynamically adaptive scheduling system | |
WO2004031886A3 (en) | Interactive benchmarking system | |
AU2003202119A1 (en) | Providing human performance management data and insight | |
WO2007016129A3 (en) | Dynamic content devlopment based on user feedback | |
WO2003069427A3 (en) | Caloric management system and method with voice recognition | |
AU2003226220A1 (en) | Using disassociated images for computer and storage resource management | |
WO2003077116A3 (en) | System management controller negotiation protocol | |
WO2007022513A3 (en) | Software architecture for displaying information content from plug-in modules in a user interface | |
WO2009140601A3 (en) | Genetic marker weight management | |
WO2006104933A3 (en) | Heterogeneous content channel manager for ubiquitous computer software systems | |
WO2009131863A8 (en) | Composite assets for use in multiple simulation environments | |
WO2006081013A3 (en) | System and method of managing content | |
WO2004061629A3 (en) | Privileged-based qualification of branch trace store data | |
WO2008116108A3 (en) | Non-invasive human-health-measurement system and method | |
GB0301777D0 (en) | Improvements in and relating to computer operating system data management | |
WO2005013627A3 (en) | Compliance rules for dynamic bidding | |
AU2001227589A1 (en) | Large-scale network management using distributed autonomous agents | |
WO2007025211A3 (en) | Methods and systems for ranking and investing in financial instruments | |
CA2493897A1 (en) | Distributed contact information management | |
WO2003046718A3 (en) | A system to provide an individual data processing environment | |
AU2002337784A1 (en) | Portable business information content and management system | |
Moss et al. | WEBSITES AND SERVICES BRANDING: IMPLICATIONS OF UNIVERSITIES’WEBSITES FOR INTERNAL AND EXTERNAL COMMUNICATION |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2005762383 Country of ref document: EP Ref document number: 2574483 Country of ref document: CA Ref document number: 2007522513 Country of ref document: JP Ref document number: 2005275524 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 180821 Country of ref document: IL |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 409/KOLNP/2007 Country of ref document: IN |
|
ENP | Entry into the national phase |
Ref document number: 2005275524 Country of ref document: AU Date of ref document: 20050623 Kind code of ref document: A |
|
WWP | Wipo information: published in national office |
Ref document number: 2005275524 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020077003763 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 2005762383 Country of ref document: EP |