Patent
Configurable password integrity servers for use in a shared resource environment
Reads0
Chats0
TLDR
In this article, a network system server that provides password composition checking for a plurality of clients is disclosed, which includes a main data store, a security server, a password synchronization server coupled to the main data server and the plurality of users.Citations
More filters
Patent
System and methodology for managing internet access on a per application basis for client computers connected to the internet
TL;DR: In this paper, a client-based monitoring and filtering of access to an open network, such as a WAN or the Internet, is described, which includes one or more clients, each operating application or process (e.g., Netscape Navigator™ or Microsoft Internet Explorer™ browser software) requiring Internet (or other open network) access, and a centralized enforcement supervisor.
Patent
Automated on-line information service and directory, particularly for the world wide Web
Ralph Wesinger,Christopher Coley +1 more
TL;DR: In this article, a database is used to provide a hardware-independent, dynamic information system in which the information content is entirely user-controlled, and requests are received from individual users of the computer network to electronically publish information, and input is accepted from the individual users.
Patent
Method and System for Managing Computer Security Information
Timothy P. Farley,John M. Hammer,Bryan Douglas Williams,Philip Charles Brass,George C. Young,Derek John Mezack +5 more
TL;DR: In this article, the authors present a fusion engine that can identify relationships between one or more real-time, raw computer events as they are received in realtime, and assess and rank the risk of realtime raw events as well as mature correlation events.
Patent
System and methodology for security policy arbitration
TL;DR: In this article, a system providing methods for a device to apply a security policy required for connection to a network is described, where a current policy to apply to a device for governing the connection to this particular network is determined from a plurality of available security policies available to the device.
Patent
Computer immune system and method for detecting unwanted code in a computer system
TL;DR: In this article, an automated analysis system detects malicious code within a computer system by generating and subsequently analyzing a behavior pattern for each computer program introduced to the computer system and storing behavior patterns and sequences in a database.
References
More filters
Patent
Cooperative processing interface and communication broker for heterogeneous computing environments
TL;DR: In this article, an object interface is disclosed that supports three modes of inter-object communication: message processing (store and forward), conversational communication, and remote procedure call, and the broker manages the service offerings from servers and service requests from clients.
Patent
One-time logon means and methods for distributed computing systems
TL;DR: In this paper, a multiple logon procedure (16) and secure transport layer protocol (SPLP) are used with a user's communication software and network communication software to authenticate users in a distributed networked computing system.
Patent
Method and system for authenticating access to heterogeneous computing services
TL;DR: In this paper, a method and system for authenticating access to heterogeneous computing services is provided. But it does not specify how to authenticate a user's identification information, such as a user name, a password, and a domain.
Patent
Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system
TL;DR: In this article, the authors proposed a login protocol that enables remote authentication of a user's password without transmitting the password over the network, but the login agent is not trusted with the user's passwords and is therefore a "semi-trusted" node.
Patent
Method and apparatus for controlling network and workstation access prior to workstation boot
TL;DR: In this article, a preboot file and information transfer between workstations and servers on local area networks is discussed, where a hardware component, such as a PROM or RAM, is used to enable pre-boot functions to take place in the workstation.