Follow us on Twitter
twitter icon@FreshPatents


Access Rights patents

      

This page is updated frequently with new Access Rights-related patent applications.




 Multilayer access control for connected devices patent thumbnailMultilayer access control for connected devices
A system for controlling accesses to network enabled devices includes a network interface over which a hub communicates with network enabled devices, a processor, and a multilayer access control layer. The access control layer includes instructions that, when executed by the processor, cause the processor to detect, at the hub, a request representing an attempt by an application executing on a remote host device to access a network enabled device communicatively coupled to the hub, characterize the request according to a user of the remote host device, the application making the attempt, and the network enabled device, and determine whether to allow or deny the request based upon the characterization and a plurality of rules.
Mcafee, Inc.


 System, method, software, and  computer network management patent thumbnailSystem, method, software, and computer network management
Systems, methods, software, and apparatus for managing computer networks are described where a combination of high levels of technical expertise and access rights preclude current users from installing mandated ids and network management tools on the small office, home office (soho) and small branch installations. In some embodiments, the invention implements network packet capture and distributed packet and stream analysis using “hacker” techniques that redirect existing network packet flows to the network management and monitoring appliance without requiring the network user to have authorized access to reconfigure the router.
Defensative, Llc


 Secure cloud storage distribution and aggregation patent thumbnailSecure cloud storage distribution and aggregation
Methods and systems for vendor independent and secure cloud storage distribution and aggregation are provided. According to one embodiment, an application programming interface (api) is provided by a cloud storage gateway device logically interposed between third-party cloud storage platforms and users of an enterprise.
Fortinet, Inc.


 System and  controlling access patent thumbnailSystem and controlling access
A method for controlling access of a user to a physical device which is provided with an access control unit that can block and release access to functions of the physical device includes the provision of a central control platform and a mobile access device. An identification check of the user is carried out, the user being identified by the mobile access device.
Huf Huelsbeck & Fuerst Gmbh & Co. Kg


 Biometric authentication system patent thumbnailBiometric authentication system
The disclosure provides a method and system for authenticating a user using biometric data and geographic location of the user's device (client device). The method involves establishing a connection between a server and a client.
Aetna Inc.


 Systems for network risk assessment including processing of user access rights associated with a network of devices patent thumbnailSystems for network risk assessment including processing of user access rights associated with a network of devices
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network risk assessment. One of the methods includes obtaining information describing network traffic between a plurality of network devices within a network.
Palantir Technologies Inc.


 Method for managing user accounts in a hosted application patent thumbnailMethod for managing user accounts in a hosted application
A method for managing user accounts in an application of an application provider, includes: receiving a request for proof of authentication to authenticate a user attempting to access the application, the user being registered with an identity provider having a trust relationship with the application provider; obtaining, from a local database, user data including authentication data and access rights data; authenticating the user by the authentication data; determining the user right to access the application, by the access rights data; determining the existence or absence of a user account associated with the user, by querying an external database managed by the application provider; if the user has the right to access the application and there is no user account associated with the user: triggering provisioning of the user account at an entity, generating a proof of authentication associated with the user, sending the proof of authentication to the application provider.. .
Evidian


 Mobile key devices  programming and communicating with an electronic programmable key patent thumbnailMobile key devices programming and communicating with an electronic programmable key
Systems, methods, and apparatuses for communicating information, altering access rights, and transferring power to and from an electronic programmable key are disclosed. Using a wireless channel of communication established between the key and a mobile device, information and access rights can be communicated from and to the electronic programmable key.
Acsys Ip Holding Inc.


 Systems for network risk assessment including processing of user access rights associated with a network of devices patent thumbnailSystems for network risk assessment including processing of user access rights associated with a network of devices
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network risk assessment. One of the methods includes obtaining information describing network traffic between a plurality of network devices within a network.
Palantir Technologies Inc.


 Method for incorporating a communication device in a network, and arrangement having at least one network filter component and at least one configuration server patent thumbnailMethod for incorporating a communication device in a network, and arrangement having at least one network filter component and at least one configuration server
A method is provided for incorporating a communication device in a network including a set of configuration servers having at least one configuration server, and a set of productive servers having at least one productive server. The method includes (a) establishing a connection between the communication device and the network, which connection is restricted solely to a stipulated selection from the set of configuration servers; (b) obtaining configuration data from the stipulated selection of configuration servers, which stipulate access rights of the communication device to a selection from the set of productive servers; and (c) configuring the communication device using the obtained configuration data such that access by the communication device is restricted to the selection from the set of productive servers..
Siemens Aktiengesellschaft


Systems and methods for providing storage of data on servers in an on-demand media delivery system

A system and method may be provided that allows users to store, retrieve, and manipulate on-demand media content and data stored on a remote server network in an on-demand media delivery system. More particularly, the system may allow a user to access his or her on-demand media account from user equipment in different locations as long as the current user equipment can communicate with a remote server that stores user-specific information.
Rovi Guides, Inc.

Allocating and tracking resource distributions in computer networks

Systems and methods for allocating and tracking resource distributions are disclosed herein. An example method includes: assigning, to at least two resource providers (e.g., an educational foundation and/or a civic organization, etc.) that are each associated with a resource recipient (e.g., a teacher or a user), access rights to receive information about resource allocation events associated with the resource recipient.
Classwallet

Intelligent door lock system with audio and rf communication

A wireless access control system is provided to lock or unlock a first door at a dwelling of a user. A user remote access device accepts input based on haptic feedback or motion.
August Home Inc.

Apparatus, system and method

There is disclosed apparatus operative to provide intermediary gateway control for access to an item stored on a third party shareable data store, the apparatus operative to receive identification data identifying a first user having share access control to one or more items stored on a third party shareable data store. The apparatus is further operative to establish access rights to the third party shareable data store utilising access rights of the first user for accessing the one or more items on the third party shareable data store; and store the access rights in a first user data structure.
Sharewell Ltd

Apparatus, system and method

There is disclosed apparatus operative to provide intermediary gateway control for access to an item stored on a third party shareable data store, the apparatus operative to receive identification data identifying a first user having share access control to one or more items stored on a third party shareable data store. The apparatus is further operative to establish access rights to the third party shareable data store utilising access rights of the first user for accessing the one or more items on the third party shareable data store; and store the access rights in a first user data structure.
Sharewell Ltd

Resource management based on physical authentication and authorization

Systems and methods are disclosed that provide for management of resources of one or more systems included in an access-controlled area of a distributed site of an electric power delivery system. In certain embodiments, one or more users entering and access-controlled area may be identified via physical access control credentials provided to an associated access control system.
Schweitzer Engineering Laboratories, Inc.

Apparatus system and method

There is disclosed apparatus operative to provide intermediary gateway control for access to an item stored on a third party shareable data store, the apparatus operative to receive identification data identifying a first user having share access control to one or more items stored on a third party shareable data store. The apparatus is further operative to establish access rights to the third party shareable data store utilising access rights of the first user for accessing the one or more items on the third party shareable data store; store the access rights in a first user data structure; and to receive restriction information for the first user and to store the restriction information in association with the first user.
Sharewell Ltd

Management of access to service in an access point

access rights to wireless resources and telecommunication service(s) supplied through a set of access points (aps) are configured. Access to wireless resources is authorized by access attributes in access control list(s) (acl(s)) while a profile of service attributes linked to the acl(s) regulate provision of telecommunication service(s).
At&t Intellectual Property I, L.p.

Provisioning a network subscription

Provisioning a subscriber in a network is provided by: receiving an initialisation request for access to a network on behalf of a subscriber, at an admission platform of a network operator associated with the subscriber, and assigning the subscriber limited access rights to the network, the limited access rights being configured for communication between the subscriber and a subscription manager, for reconfiguration of identity information associated with the subscriber.. .
Vodafone Ip Licensing Limited

Automated network connection sharing

Concepts and technologies are described herein for providing automated network connection sharing. Techniques disclosed herein can initiate internet connection sharing between a first computer and a second computer, wherein the internet connection sharing enables the first computer to function as a host to provide internet access to the second computer.
Microsoft Technology Licensing, Llc

Intelligent door lock system with audio and rf communication

A wireless access control system is provided to lock or unlock a first door at a dwelling of a user. A user remote access device transmits a first signal and a second signal.
August Home Inc.

Method and system for collaborative execution of business processes

A computer-implemented method and system are provided for collaborative execution of business processes shared by entities and outsourced business partners providing products or services to the entities. A single software service is provided with common business process rules, a common business information schema, and a single directory of shared workspaces for registered users of all entities and outsourced partners on a publicly available server computer.
Tracelink, Inc.

Method and device for protecting a computing apparatus against manipulation

A method for protecting a computing apparatus against manipulation, which computing apparatus includes a plurality of components, which are designed to execute software and which have associated access rights is provided. The method includes the following steps: withdrawing a number of the access rights to the components during a starting process of the computing apparatus and specifying a subset of the access rights to the components on the basis of the withdrawn access rights, which subset cannot be changed during the execution of the software.
Siemens Aktiengesellschaft

System and access control and identity management

In a computer environment, a mechanism for the flow of access by means of derivation is provided. Typically, access rights granted with respect to an access point flow (or derive from) an access provider to an access recipient.
Skai, Inc.

System and controlling opening of files by vulnerable applications

Disclosed are systems and methods for controlling opening of computer files by vulnerable applications. An example method includes: detecting a request from a software application to open a computer file on the user computer; determining one or more parameters of the file; determining a file access policy based on the parameters of the file, wherein the file access policy specifies at least access rights of the software application to the resources of the user computer; identifying vulnerabilities of the software application; determining an application launching policy for the software application based at least on the determined vulnerabilities, wherein the application launching policy specifies at least whether opening of the file is permitted or prohibited; and controlling opening of the file on the user computer and accessing of the computer resources by the software application working with the opened file based on the file access policy and application launching policy..
Kaspersky Lab Zao

Information processing apparatus, information processing method, and non-transitory computer readable medium

An information processing apparatus includes a first memory that stores information on plural websites and access rights of a user to the plural websites, in association with each other, an indexing unit that accesses each of the plural websites in accordance with the access rights of the user, and generates an index of content of the plural websites, a second memory that stores the index generated by the indexing unit in association with the user, a controller that controls such that a portal site representing an entry point to the plural websites is displayed, a receiving unit that receives, on the portal site, an input of search conditions for the plural websites from the user, and a searching unit that searches the index stored in association with the user in the second memory, in accordance with the input search conditions.. .
Fuji Xerox Co., Ltd.

Multi-layered metadata management system

A metadata layer management system is presented. Layers of metadata objects can be constructed where each metadata layer object comprises a rights policy.
Pandexio, Inc.

Access control communication device, method, computer program and computer program product

It is presented an access control communication device comprising: a short distance radio communication module; a cellular radio communication module; and a controller arranged to communicate access rights associated with a key device, using the cellular radio communication module, with an access control device over a cellular communication network, the communicating comprising sending a request for access management data associated with the lock device, and receiving access management data associated with the lock device; and the controller further being arranged to transmit the access management data to the key device for transfer to the lock device, the communicating and transmitting being arranged to be performed upon the access control device being in communication with the key device using the short distance radio communication module. A corresponding method, computer program and computer program product area also presented..
Assa Abloy Ab

Method for managing access rights of a user to a place

When the readout unit (22, 26) receives a response from the physical medium (14), receiving the identification code.. .

Creating groups of users in a social networking system

A social networking system facilitates a user's creation of a group of other users from among the user's connections in the user's social network. The created groups may be used, for example, to publish information to certain user-defined groups or to define privacy settings or other access rights to the user's content according to such user-defined groups.
Facebook, Inc.

System and management of cache configuration

Systems and methods for managing cache configurations are disclosed. In accordance with a method, a system management control module may receive access rights of a host to a logical storage unit and may also receive a desired caching policy for caching data associated with the logical storage unit and the host.

Debug architecture

Roughly described, a method of restricting access of a debug controller to debug architecture on an integrated circuit chip, the debug architecture comprising an access controller, a plurality of peripheral circuits, and a shared hub, the shared hub being accessible by the access controller and the plurality of peripheral circuits, the method comprising: at the access controller, authenticating the debug controller; at the access controller, following authentication, assigning to the debug controller a set of access rights, the set of access rights granting the debug controller partial access to the debug architecture; and after assigning the set of access rights, allowing the debug controller access to the debug architecture as allowed by the set of access rights.. .
Ultrasoc Technologies Ltd.

System and providing limited access to data

A system and computer-implemented method for providing access to data of a first party including receiving information for identifying the first party, authenticating the first party using the received information for identifying the first party and generating a first read-only personal identification number (pin). The first read-only pin is associated with a first set of access rights for the data of the first party and provided to a second party.
Capital One Financial Corporation

Wireless access control intelligent door lock system

A wireless access control system to lock or unlock a first door at a dwelling of a user. A user remote access device transmits a first signal and a second signal.
August Home Inc.

Computer device and controlling access to a resource via a security system

A computer system 300 contains an agent 303 which modifies the ordinary behaviour of a native security system 103, such as to allow security decisions with alternate granularity or an alternate set of access rights. The agent 303 intercepts authorisation requests made by applications 109 for resources 110 identified by uris 111 and sends amended requests to the security system 103.
Avecto Limited

Automatic folder access management

Methods and systems are provided for decentralizing user data access rights control activities in networked organizations having diverse access control models and file server protocols. A folder management application enables end users of the file system to make requests for access to storage elements, either individually, or by becoming members of a user group having group access privileges.
Varonis Systems, Inc.

System and securing machine-to-machine communications

This invention concerns the implementation of end-to-end security for the communication between objects in the domain of the internet of things (or internet of objects). The purpose of the patent is dealing with the setup of secure authorized information channel between data source (m2m device) and data consumers (consumer entity).
Gemalto Sa

Dynamic filtering and precision alteration of query responses responsive to request load

Embodiments relate to processing a request from a user device for access rights for a resource. An access management system can send a request to query a (e.g., cached or authoritative) data store for available access rights.

Method and system of automated generation of user form interface

A system and method is disclosed for carrying out an automatic generating of user interfaces in the form of dynamically changing screen forms. The method includes accessing object metadata relating to a user interface, loading a logical description for the user interface based on the metadata, retrieving functional options related to the metadata and determining requirements for at least one additional change to the user interface based on the functional options and retrieving access rights available for a user of the user form interface.
1c Llc

A key box

A key box (1) has a housing (10) and a cooperating door (11) which, in combination, form a secured space (9) when the door (11) is closed, wherein the door (11) is locked by means of an electric locking system. The locking system comprises an electric locking mechanism (21), an electronic control unit (22) and a wireless communication unit (23).
Bekey A/s

Virtual set-top box device methods and systems

An exemplary method includes virtual set-top box (“stb”) device system receiving a registration request to register a mobile computing device to operate as a virtual stb device, verifying that the mobile computing device is within a predefined vicinity of a dedicated stb device that is located at a user premises, providing, to the mobile computing device, a virtual stb key for use by the mobile computing device to operate as the virtual stb device by leveraging access rights of an end-user account of a media content distribution service to access the media content distributed by way of the media content distribution service, and facilitating sharing of the virtual stb key with a media content processing device for use by the media content processing device to access the media content distributed by way of the media content distribution service. Corresponding systems and methods are also described..
Verizon Patent And Licensing Inc.

Method, apparatus and computer program

An approach is provided for enabling access to content in a network service. Location information is received, at a server, relating to a first remote apparatus and another remote apparatus.
Core Wireless Licensing S.a.r.l.

Method for causing operating system to have immune function

Process information is caused to have an input source and access rights to resources, and by identifying from what input source a process has arisen and from what input source a command request originates, foreign process and normal processes are distinguished. By limiting access to system resources from foreign processes, the system is protected..

Correlation based security risk identification

Methods and systems are disclosed for identifying security risks, arising from credentials existing on machines in the networks that enable access to other machines on the networks. Account credentials indications are retrieved from machines in the network, which indicate that credentials for accounts are stored on those machines.
Cyber-ark Software Ltd.

Digital rights management system with confirmation notification to document publisher during document protection and distribution

A digital rights management (drm) method for protecting digital documents, implemented in a drm system. When an operator (document publisher) scans a document on a scanner to generates a digital document and specifies a list of users who will be granted access rights to the document, the drm system applies digital rights protection to the document according to the specified access rights, and distributes the document to the specified users; the system also sends a confirmation notification such as an email to the document publisher, which contains a list of the receiving users, a copy of the protected digital document, and a link to a web-based tool that will allow the publisher to modify the access rights granted to the users.
Konica Minolta Laboratory U.s.a., Inc.

System for the management of files

A system and procedure for the administration of files by using electronical data processing equipment that are connected with each other by a network. In order to provide a unitary system to solve all modern office and communication tasks instead of using a multitude of programs, systems and devices, it is suggested with the invention that at least one data processing installation features a user-related container file system whose function is based on the fact that the files of a particular user are collected into one single data file, wherein the access to the files of the data file occurs depending on access rights and wherein an automatic comparison of the data files with a replica existent within the system is being performed..

Systems and methods for distributing access rights

Systems and methods for distributing access licenses or access rights are disclosed. Further disclosed are computer program products for enabling primary and secondary distributions of access rights and enabling assignment of identification tokens to access rights..
Tandum Llc

Computerized system and navigating data with tree structure visualization using segmented access rights

A computer system and method is disclosed for financial management and estate planning. The system provides data aggregation for both financial and non-financial assets to create a “virtual vault” from which the owner can view all information about his/her portfolio.
Masttro Holding Ag

Data management platform using metadata repository

An analytical computing environment for large data sets comprises a software platform for data management. The platform provides various automation and self-service features to enable those users to rapidly provision and manage an agile analytics environment.
Podium Data, Inc.

Policy separation

The present invention relates to a policy decision point for interacting with a computer system comprising a plurality of resources, to which subjects' access is controlled by corresponding policy enforcement points. The pdp comprises: a memory storing at least two policy packages, each controlling access rights to resources, and a connection table associating each policy package with an end point address; a network interface operable to communicate with the peps, wherein the network interface obtains access requests from a pep and returns access decisions to the pep, each access request comprising an end point address for directing the access request to the pdp; and a processor operable to: analyze an access request and determine, based on the end point address receiving the access request, an associated policy package; and evaluate the access request against the policy package thus determined..
Axiomatics Ab

Facilitating separation-of-duties when provisioning access rights in a computing system

Systems and methods for managing risk management rules are provided. A risk management rule may be configured at a rule configuration interface are described.
Bank Of America Corporation

Reconciliation of access rights in a computing system

Systems and methods are provide for reconciling access rights of a computing system are described. Access right information that respectively corresponds to access rights of a computing system may be obtained and evaluated.
Bank Of America Corporation



Access Rights topics:
  • Access Rights
  • Access Control
  • Near Field Communication
  • Authentication
  • Authorization
  • Computer System
  • Data Access
  • Exhaustive Search
  • User Group
  • File Server
  • Access Permission
  • Permissions
  • Networking
  • User Profile
  • Social Network


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Access Rights for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Access Rights with additional patents listed. Browse our RSS directory or Search for other possible listings.


    0.5103

    file did exist - file did put2545

    3 - 1 - 52