Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

68 results about "Security compliance" patented technology

The Security Compliance Manager (SCM) is a free tool from Microsoft that enables you to quickly configure, and manage the computers in your environment using Group Policy and Microsoft System Center Configuration Manager.

Information safety simulation model and terminal of industrial control system

The invention provides an information safety simulation model and terminal of an industrial control system. The information safety simulation model comprises a network safety simulation module,a network safety product simulation module and a network safety training module; the network safety simulation module conducts safety compliance detection on the network structure of the industrial control system,conducts safety detection on the network flow of the industrial control system and conducts safety detection on a network host of the industrial control system; the network safety product simulation module tests the function,loopholes and performance of a network safety product,obtains testing information,and evaluates the conformity of identification information and the testing informationof the network safety product; the network safety training module simulates the usage scenario,the operating scenario and the emergency response scenario of the industrial control system. The information safety simulation model is more professional and diversified in function in the aspect of network safety simulation and wide in applicable range,and does not rely on a power simulation system,so that the technical problems of dependence on a network safety attack simulation technology of the industrial control system,limitation and non-professional performance of an existing information safetysimulation model are solved.
Owner:HANGZHOU ANHENG INFORMATION TECH CO LTD

Discovery, deployment, and security systems and methods

A system and method for discovering devices connected to a communications network, such as the Internet, includes an agent and installation of the agent on a communications device of the network. The agent is installed on a delegate device, which may, but need not necessarily, be an administration device for the network. The delegate device discovers all other devices of the network, via the agent. The agent is also installed on each other networked device, either by direct installation or by pushing the agent to each other device by communications over the network from the delegate device after discovery. The delegate device, which may be the same device that discovers or another device so designated by delegation, deploys the agent on the other devices, including by delegating authority and capabilities to dictate operations by the other devices. The delegate device can delegate to each other device the ability to discover other networked devices, or not, and also can delegate other functions of the agent once deployed on the other devices. The delegate device (or devices, as the case may be), and the other devices on which are deployed the agent, are linked in communication over the network, for example, to communicate via TCP/IP protocols. The agent of the delegate device controls by delegation to the agent of the other devices, the permissible operations of the agent on the other devices. The agent of each device can be delegated authority and capability, by communications from the delegate device (which may, but need not necessarily be, an administration device for the network), to automatedly or otherwise download software patches and perform security compliance operations at each device.
Owner:TRIACTIVE

Targeted anti-piracy system and methodology

A movie anti-piracy system with sensing and reporting is provided. A movie projector projects a light image to reflect off of a screen, while an infrared energy projection source generates an infrared energy pattern which is reflected off the screen (or otherwise projected) in the same field of view as the light images reflecting from the screen. Infrared energy sensors are positioned in the seating area of the theater. The infrared sensors provide sensed signals respectively to a sensor response controller. The controller is responsive to the sensor signals to provide an infrared status (and other data) signal output to a control center. The control center responds to the infrared status and other data signals, from one or a plurality of theaters, and provides for reporting of information (such as security compliance, attendance, etc.) to one or multiple reporting sites (such as movie distribution studios, etc.). In a preferred embodiment, the control center determines whether the infrared sensors or other data indicate violation of anti-piracy protection within a theater and provides reporting on the status and data. If a violation is indicated, then the control center sends a violation signal such as to the sensor response controller which can trigger an alarm and/or activate a violation inhibit output to shut down the movie projector. This shut down of the projector is an optional feature. In a preferred embodiment, the shut down can be overridden with the entry of an appropriate security code. A data entry subsystem permits entry of additional data, which is communicated as signal to the sensor response controller. The controller provides for processing the data from the data entry and communicating to the control center. The additional data can include ticket sales for one or more movies, attendance data, security code, etc. In a preferred embodiment, there are a plurality of theater systems, each of which has an equivalent anti-piracy system installed, each providing reporting back to the control center which provides overall system control.
Owner:DIGIMEDIA TECH LLC +1

Client computer for protecting confidential file, server computer therefor, method therefor, and computer program

A client computer includes an encryption/decryption unit for encrypting a confidential file in which an encryption key ID is embedded using an encryption key corresponding to the encryption key ID and decrypting the confidential file using a decryption key corresponding to the encryption key ID, an encryption key storage unit for storing the encryption key, a decryption key storage unit for storing the decryption key, a compliance requirement storage unit for storing security compliance requirements for the client computer transmitted from a server computer, and a security requirement monitoring unit for determining, according to a read command or a write command for the confidential file issued by application software, whether the client computer complies with the security compliance requirements, and, when the requirements are complied with, passing the encryption key and the encryption key ID corresponding to the encryption key from the encryption key storage unit to the encryption/decryption unit in response to the write command or passing the decryption key corresponding to the encryption key ID embedded in the encrypted confidential file from the decryption key storage unit to the encryption/decryption unit in response to the read command.
Owner:IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products