$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System, method and medium for certifying and accrediting requirements compliance 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/60
출원번호 US-0794386 (2001-02-28)
발명자 / 주소
  • Tracy, Richard P.
  • Smith, Peter A.
  • Berman, Lon J.
  • Catlin, Gary M.
  • Wilson, David J.
  • Barrett, Hugh
  • Hall, Jr., Larry L.
출원인 / 주소
  • Telos Corporation
인용정보 피인용 횟수 : 57  인용 특허 : 32

초록

A computer-implemented system, method and medium for assessing the risk of and/or determining the suitability of a system to comply with at least one predefined standard, regulation and/or requirement. In at least some embodiments of the present invention, the method can utilize the steps of: 1) gat

대표청구항

1. A computer-assisted method of assessing the risk of and/or determining the suitability of a target system to comply with at least one predefined standard, regulation and/or requirement, the target system including hardware and/or software, the method comprising the steps of:a) collecting informat

이 특허에 인용된 특허 (32)

  1. Steinmetz Michael J. ; Kirst Michael E., Automated diagnostic system.
  2. Michel K. Bowman-Amuah, Building techniques in a development architecture framework.
  3. Dew Larry A. ; Davison William B. ; Miller Timothy E. ; Slazinski Robert M., Common database system for a communication system.
  4. Shostack Adam ; Allouch David,ILX, Computer security.
  5. Drake Christopher Nathan,AUX, Computer software authentication, protection, and security system.
  6. Julie Lynn Huff ; Tracy Glenn Shelanskey ; Sheila Ann Jackson, Dynamic system defense for information warfare.
  7. Lermuzeaux Jean-Marc (St Michel sur Orge FRX) Emery Thierry (St Germain les Arpajon FRX) Gonthier Patrice (Antony FRX), Facility for detecting intruders and suspect callers in a computer installation and a security system including such a f.
  8. Schneier Bruce, Method and apparatus for analyzing information systems using stored tree database structures.
  9. Esbensen Daniel, Method and apparatus for automated network-wide surveillance and security breach intervention.
  10. Klaus Christopher W., Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication sy.
  11. Jones Wendell Davis ; Aud Stephen J. ; Hudepohl John P. ; Flournory Martin L. ; Snipes William B. ; Schutz Eric C., Method and system for dynamic risk assessment of software systems.
  12. Tamayo Tokuda JP; Hisao Mase JP; Hiroshi Tsuji JP, Method and system for managing workflow.
  13. Walker Jeffrey H., Method and system for reducing the volume of audit data and normalizing the audit data received from heterogeneous sources.
  14. Bhat Sunil (Colorado Springs CO) McKee Neil (Bristol GBX), Method for determining topology of a network.
  15. Todd ; Sr. Robert E. ; Glahe Aaron C. ; Pendleton Adam H., Method for network self security assessment.
  16. Terada Masato,JPX ; Yoshida Kenichi,JPX ; Kayashima Makoto,JPX, Network system having external/internal audit system for computer security.
  17. Ronnen U. George (Ocean NJ), Network vulnerability management apparatus and method.
  18. Brandwajn Vladimir (San Jose CA) Ipakchi Ali (San Carlos CA) Kumar A. B. Ranjit (Cupertino CA) Cauley Gerald W. (San Jose CA), Neural network for contingency ranking dynamic security indices for use under fault conditions in a power distribution s.
  19. Grimm Robert ; Bershad Brian N., Process for transparently enforcing protection domains and access control as well as auditing operations in software components.
  20. Fieres Helmut ; Merckling Roger ; Klemba Keith, Software level touchpoints for an international cryptography frameworks.
  21. Kodosky Jeffrey L. ; Andrade Hugo ; Odom Brian K. ; Butler Cary P., System and method for configuring an instrument to perform measurement functions utilizing conversion of graphical programs into hardware implementations.
  22. Testa Louis C. ; Geiger Susan P., System and method for generating test program code simultaneously with data produced by ATPG or simulation pattern capture program.
  23. Davis James W. ; Du Weimin ; Shan Ming-Chien, System and method for performing flexible workflow process compensation in a distributed workflow management system.
  24. Devanbu Premkumar Thomas ; Stubblebine Stuart Gerald, System and method for providing assurance to a host that a piece of software possesses a particular property.
  25. Gleichauf Robert ; Shanklin Steven, System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment.
  26. Michael F. Guheen ; James D. Mitchell ; James J. Barrese, System for establishing plan to test components of web based framework by displaying pictorial representation and conveying indicia coded components of existing network framework.
  27. Bowman-Amuah Michel K., System, method and article of manufacture for configuration management in a development architecture framework.
  28. Michel K. Bowman-Amuah, System, method and article of manufacture for managing an environment of a development architecture framework.
  29. Bowman-Amuah Michel K., System, method and article of manufacture for security management in a development architecture framework.
  30. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  31. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  32. Shrader Theodore Jack London ; Ault Michael Bradford ; Child Garry L. ; Plassmann Ernst Robert ; Rich Bruce Arland ; Soper Davis Kent, Web client scripting test architecture for web server-based authentication.

이 특허를 인용한 특허 (57)

  1. Kaminski, Joseph W., Beam forming apparatus.
  2. Kaminski, Joseph W., Beam forming apparatus.
  3. Kotowski, Andreas; Agrawal, Neeraj, Cargo scanning system with boom structure.
  4. Morton, Edward James; Baldwin, Francis; Kotowski, Andreas F., Compact mobile cargo scanning system.
  5. Morton, Edward James; Baldwin, Francis; Kotowski, Andreas F., Compact mobile cargo scanning system.
  6. Dolinsky, Todd; Streete, Jonathan P.; Hansen, Nicholas; Shan, Xuning Vincent, Compliance testing engine for integrated computing system.
  7. Dolinsky, Todd; Streete, Jonathan P.; Hansen, Nicholas; Shan, Xuning Vincent, Compliance testing engine for integrated computing system.
  8. Barday, Kabir A., Data processing systems and communication systems and methods for the efficient generation of privacy risk assessments.
  9. Barday, Kabir A.; Brannon, Jonathan Blake, Data processing systems and communications systems and methods for integrating privacy compliance systems with software development and agile tools for privacy design.
  10. Barday, Kabir A.; Brannon, Jonathan Blake, Data processing systems and methods for efficiently assessing the risk of privacy campaigns.
  11. Barday, Kabir A., Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design.
  12. Barday, Kabir A., Data processing systems and methods for operationalizing privacy compliance via integrated mobile applications.
  13. Barday, Kabir A., Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance.
  14. Barday, Kabir A., Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance.
  15. Barday, Kabir A.; Sabourin, Jason L.; Brannon, Jonathan Blake; Karanjkar, Mihir S.; Jones, Kevin, Data processing systems for fulfilling data subject access requests and related methods.
  16. Barday, Kabir A.; Karanjkar, Mihir S.; Finch, Steven W.; Browne, Ken A.; Heard, Nathan W.; Patel, Aakash H.; Sabourin, Jason L.; Daniel, Richard L.; Patton-Kuhl, Dylan D.; Brannon, Jonathan Blake, Data processing systems for generating and populating a data inventory.
  17. Barday, Kabir A.; Karanjkar, Mihir S.; Finch, Steven W.; Browne, Ken A.; Heard, Nathan W.; Patel, Aakash H.; Sabourin, Jason L.; Daniel, Richard L.; Patton-Kuhl, Dylan D.; Brannon, Jonathan Blake, Data processing systems for generating and populating a data inventory for processing data access requests.
  18. Barday, Kabir A.; Brannon, Jonathan Blake, Data processing systems for modifying privacy campaign data via electronic messaging systems.
  19. Barday, Kabir A.; Sabourin, Jason L.; Brannon, Jonathan Blake; Karanjkar, Mihir S.; Jones, Kevin, Data processing systems for prioritizing data subject access requests for fulfillment and related methods.
  20. Morton, Edward James, Detector support structures for gantry scanner systems.
  21. Childress, Rhonda L.; Goldberg, Itzhack; Kumhyr, David Bruce; Watt, Stephen James, Determining priority for installing a patch into multiple patch recipients of a network.
  22. Silverman, Robert S., Elastomeric book cover.
  23. Silverman,Robert S., Elastomeric book cover.
  24. Morton, Edward James, Gantry scanner systems.
  25. Jarvi, Ari; Tykkylainen, Jarno; Morton, Edward James, Intelligent security management system.
  26. Langeveld, Willem Gerhardus Johannes; Bendahan, Joseph; Gozani, Tsahi; King, Michael; Strellis, Dan; Franco, Edward; Alfonso, Krystal R., Low-dose radiographic imaging system.
  27. Keenan, Perry; Conlon, Kathleen; Jackson, Alan, Method and apparatus for predicting project outcomes.
  28. Modica,Peter; Le,Khai; Nguyen,Phong, Method and system for certifying operators of x-ray inspection systems.
  29. Modica, Peter; Le, Khai; Nguyen, Phong, Method and system for certifying operators of x-ray systems.
  30. Nori, Sarita Brahmandam; Pae, Christine; Thiagarajan, Bhuvaneswari, Method(s) for updating database object metadata.
  31. Ryge, Peter; Hughes, Ronald J.; Gray, Steven J., Multiple screen detection systems.
  32. Ryge, Peter; Hughes, Ronald; Kotowski, Andreas F., Multiple screen detection systems.
  33. Ryge, Peter; Hughes, Ronald; Kotowski, Andreas F., Multiple screen detection systems.
  34. Gray, Stephen; Hughes, Ronald, Personnel screening system.
  35. Gray, Stephen; Hughes, Ronald, Personnel screening system.
  36. Gray, Stephen; Hughes, Ronald; Ryge, Peter; Kotowski, Andreas F., Personnel screening system.
  37. Gray, Stephen; Hughes, Ronald; Ryge, Peter; Kotowski, Andreas F., Personnel screening system.
  38. Gray, Stephen; Hughes, Ronald; Smith, Jerel, Personnel screening system.
  39. Hughes, Ronald J., Personnel security screening system with enhanced privacy.
  40. Morton, Edward James, Portable security inspection system.
  41. McCorkendale, Bruce; Sobel, William E., Presentation of network source and executable characteristics.
  42. Carver, James; Kotowski, Andreas F., Relocatable X-ray imaging system and method for inspecting commercial vehicles and cargo containers.
  43. Morton, Edward James, Scanning systems.
  44. Morton, Edward James, Scanning systems.
  45. Kotowski, Andreas; Hughes, Ronald J., Security system for screening people.
  46. Bregman, Mark; Sobel, William E., Security threat reporting in light of local security tools.
  47. Cobb, Richard M.; Elliott, Steven J.; Garrity, III, Thomas; Boccasam, Prashanth V.; Matteson, Silas S., System and method for managing controls within a heterogeneous enterprise environment.
  48. Powell, William S.; Chen, Thomas L., System, method, and software for cyber threat analysis.
  49. Powell, William Shane; Chen, Thomas L., System, method, and software for cyber threat analysis.
  50. Patil, Dipak, Systems and methods for evaluating compliance checks.
  51. Marsh, Jacob J.; Roney, Gregory D., Systems and methods for implementing modular computer system security solutions.
  52. Hughes, Ronald J., Systems and methods for improving directed people screening.
  53. Hughes, Ronald J., Systems and methods for improving directed people screening.
  54. Morton, Edward James; Peyton, Anthony J., Ultra wide band detectors.
  55. Sobel,William E; McCorkendale,Bruce, Use of geo-location data for spam detection.
  56. Kaval, Brian, X-ray imaging system having improved mobility.
  57. Bendahan, Joseph, X-ray-based system and methods for inspecting a person's shoes for aviation security threats.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로