Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

68 results about "Security compliance" patented technology

The Security Compliance Manager (SCM) is a free tool from Microsoft that enables you to quickly configure, and manage the computers in your environment using Group Policy and Microsoft System Center Configuration Manager.

Security Compliance Methodology and Tool

An apparatus is provided for evaluating risk to an organization. The apparatus includes a plurality of governmental rules directed to protecting shareholders, a plurality of security domains of the organization wherein each security domain is associated with a different asset of the organization and a request for an information risk assessment within at least one of the plurality of security domains of the organization formed under the plurality of governmental rules from a set of initializing inputs. The apparatus further includes a information risk assessment plan formed from the request for the information risk assessment, a set of information assessment templates and test cases formed from the information risk assessment plan, a set of information risk assessment tests conducted on the IT system using the assessment templates and test cases, a set of test results generated by the risk assessment tests, one or more security control gaps identified by the assessment responses and one or more gap remediation plans formed from the identified security gaps.
Owner:DENOVO ANDREW +1

DHCP centric network access management through network device access control lists

In embodiments of the present invention improved capabilities are described for the computer program product steps of serving a limited network connection to an endpoint computing facility via network device access control lists, where the limited network connection may enable the endpoint to communicate with a limited set of network resources; assessing security compliance information relating to the endpoint to determine a security state; and in response to receiving an indication that the security compliance information is acceptable, serving a managed network connection to the endpoint, where the managed connection may enable the endpoint to communicate with a larger set of network resources than the limited network connection.
Owner:SOPHOS

Protected access control method for shared computer resources

In embodiments of the present invention improved capabilities are described for providing protected computer communications. The present invention may provide for computer communications where in response to a receipt of a communication at a first computing facility from a second computing facility, the first computing facility may be caused to send a request to a compliance center for security compliance information relating to the second computing facility. In response to the request for security compliance information, the first computing facility may receive compliance information related to the second computing facility, which may cause the first computing facility to perform an action regulating further communications from the second computing facility if the second computing facility security compliance information indicates that the second client computing facility is not compliant with a current security policy.
Owner:SOPHOS

Confidential content search engine system and method

A confidential content search engine system and method are provided. With the system and method, a security compliance search engine is provided for searching one or more client computing devices for items of information that meet a security criteria identifying items of information containing confidential content. Results of the search are provided to an analysis engine for determining if the items of information identified by the search are being maintained in accordance with a security policy for ensuring the confidentiality of the confidential content. Results of the analysis may be used to generate a report or log and to generate a notification to the client computing device identifying any violations of the security policy and possible solutions for bringing the item of information into compliance with the security policy. In addition, an administrator may be notified of any violations so that corrective action may be taken.
Owner:IBM CORP

Information safety simulation model and terminal of industrial control system

The invention provides an information safety simulation model and terminal of an industrial control system. The information safety simulation model comprises a network safety simulation module,a network safety product simulation module and a network safety training module; the network safety simulation module conducts safety compliance detection on the network structure of the industrial control system,conducts safety detection on the network flow of the industrial control system and conducts safety detection on a network host of the industrial control system; the network safety product simulation module tests the function,loopholes and performance of a network safety product,obtains testing information,and evaluates the conformity of identification information and the testing informationof the network safety product; the network safety training module simulates the usage scenario,the operating scenario and the emergency response scenario of the industrial control system. The information safety simulation model is more professional and diversified in function in the aspect of network safety simulation and wide in applicable range,and does not rely on a power simulation system,so that the technical problems of dependence on a network safety attack simulation technology of the industrial control system,limitation and non-professional performance of an existing information safetysimulation model are solved.
Owner:HANGZHOU ANHENG INFORMATION TECH CO LTD

Discovery, deployment, and security systems and methods

A system and method for discovering devices connected to a communications network, such as the Internet, includes an agent and installation of the agent on a communications device of the network. The agent is installed on a delegate device, which may, but need not necessarily, be an administration device for the network. The delegate device discovers all other devices of the network, via the agent. The agent is also installed on each other networked device, either by direct installation or by pushing the agent to each other device by communications over the network from the delegate device after discovery. The delegate device, which may be the same device that discovers or another device so designated by delegation, deploys the agent on the other devices, including by delegating authority and capabilities to dictate operations by the other devices. The delegate device can delegate to each other device the ability to discover other networked devices, or not, and also can delegate other functions of the agent once deployed on the other devices. The delegate device (or devices, as the case may be), and the other devices on which are deployed the agent, are linked in communication over the network, for example, to communicate via TCP/IP protocols. The agent of the delegate device controls by delegation to the agent of the other devices, the permissible operations of the agent on the other devices. The agent of each device can be delegated authority and capability, by communications from the delegate device (which may, but need not necessarily be, an administration device for the network), to automatedly or otherwise download software patches and perform security compliance operations at each device.
Owner:TRIACTIVE

Compliance management system

A system is provided for central monitoring of operational and safety compliance at remote work sites.
Owner:MERCHANT NEIL

Targeted anti-piracy system and methodology

A movie anti-piracy system with sensing and reporting is provided. A movie projector projects a light image to reflect off of a screen, while an infrared energy projection source generates an infrared energy pattern which is reflected off the screen (or otherwise projected) in the same field of view as the light images reflecting from the screen. Infrared energy sensors are positioned in the seating area of the theater. The infrared sensors provide sensed signals respectively to a sensor response controller. The controller is responsive to the sensor signals to provide an infrared status (and other data) signal output to a control center. The control center responds to the infrared status and other data signals, from one or a plurality of theaters, and provides for reporting of information (such as security compliance, attendance, etc.) to one or multiple reporting sites (such as movie distribution studios, etc.). In a preferred embodiment, the control center determines whether the infrared sensors or other data indicate violation of anti-piracy protection within a theater and provides reporting on the status and data. If a violation is indicated, then the control center sends a violation signal such as to the sensor response controller which can trigger an alarm and/or activate a violation inhibit output to shut down the movie projector. This shut down of the projector is an optional feature. In a preferred embodiment, the shut down can be overridden with the entry of an appropriate security code. A data entry subsystem permits entry of additional data, which is communicated as signal to the sensor response controller. The controller provides for processing the data from the data entry and communicating to the control center. The additional data can include ticket sales for one or more movies, attendance data, security code, etc. In a preferred embodiment, there are a plurality of theater systems, each of which has an equivalent anti-piracy system installed, each providing reporting back to the control center which provides overall system control.
Owner:DIGIMEDIA TECH LLC +1

Client computer for protecting confidential file, server computer therefor, method therefor, and computer program

A client computer includes an encryption/decryption unit for encrypting a confidential file in which an encryption key ID is embedded using an encryption key corresponding to the encryption key ID and decrypting the confidential file using a decryption key corresponding to the encryption key ID, an encryption key storage unit for storing the encryption key, a decryption key storage unit for storing the decryption key, a compliance requirement storage unit for storing security compliance requirements for the client computer transmitted from a server computer, and a security requirement monitoring unit for determining, according to a read command or a write command for the confidential file issued by application software, whether the client computer complies with the security compliance requirements, and, when the requirements are complied with, passing the encryption key and the encryption key ID corresponding to the encryption key from the encryption key storage unit to the encryption/decryption unit in response to the write command or passing the decryption key corresponding to the encryption key ID embedded in the encrypted confidential file from the decryption key storage unit to the encryption/decryption unit in response to the read command.
Owner:IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products