Patent Portfolio

NextLabs holds 68 approved technology patents in the following area:

Dynamic Authorization

Attribute Based Access Control (ABAC)

Attribute-Based Policy Language

Policy Enforcement & Optimization

Access Analytics

Next generation Digital Rights Management

List of 68 approved patents:

  1. Enforcing Universal Access Control in an Information Management System (7877781)
  2. Techniques of Optimizing Policies in an Information Management System (8150816)
  3. Techniques and System to Deploy Policies Intelligently (7716240)
  4. Associating Code to a Target Through Code Inspection (8156566)
  5. Preventing Conflicts of Interest Between Two or More Groups Using Applications (7877409)
  6. Detecting Behavioral Patterns and Anomalies Using Information Usage Data (7774363)
  7. Techniques and System to Optimize and Automatically Deploy Policies for Offline Execution (8185548)
  8. Analyzing Usage Information of an Information Management System (8244745)
  9. Detecting Behavioral Patterns and Anomalies Using Activity Profiles (8321437)
  10. Using Information Usage Data to Detect Behavioral Patterns and Anomalies (8396890)
  11. Enforcing Application and Access Control Policies Across Multiple Applications (8407345 B2)
  12. Enforcing Attribute-Based Access Control across Multiple Information Management Systems (8,464,314)
  13. Techniques of Transforming Policies to Enforce Control in an Information Management System (8,544,058)
  14. Enforcing Policy-Based Application and Access Control in an Information Management System (8,595,788)
  15. Enforcing and Automating Information Control Using Policies in a Distributed Environment (8,621,549)
  16. Enforcing Document Control Using Policies in a Distributed Information Management System (8,627,490)
  17. Techniques and System to Optimize Policy Deployment – Inspecting Code and Reducing Code Size Associated to a Target (8,640,191)
  18. Technique and system to Improve Policy Performance in an Information Management System (8,661,003)
  19. Enforcing Access Control Policies on Servers in an Information Management System (8,677,499)
  20. Using Centrally Managed Policy to Analyze and Correlate Policy Activities and Usage Data to Detect Behavioral Patterns and Anomalies in an Distributed Information Management System (8,694,523)
  21. Policy-driven Techniques and System to Monitor and Log Access of Information Based on System and User Context (8,832,048)
  22. Preventing Conflicts of Interests Between Two or More Groups Using Applications with Policy (8,762,412)
  23. Policy-based Approach to Protect Data Shared Using Encryption and Digital Rights Protection Technique (8,843,734)
  24. Technique to Analyze and Correlate Activity Data to Detect Risk and Anomaly (8,849,858)
  25. Detecting Behavioral Patterns and Anomalies Using Information Flow and Usage Activity Data (8,862,551)
  26. Deploying Policies and Allowing Off-Line Evaluations (8,875,218)
  27. Policy Optimization Technique for Inspecting Code and Reducing Code Size Associated to a Target (8,904,478)
  28. Techniques of Transforming Policies to Enforce Control in an Information Management System (8,990,886)
  29. Enforcing Policy-Based Application and Access Control in an Information Management System (8,959,580)
  30. Technique and System to Preventing Conflicts of Interests Between Two or More Groups (8,972,449)
  31. Protecting Documents Using Policies and Encryption (9,064,131)
  32. Techniques and System to Manage Access of Information Using Policies (9,081,981)
  33. Analyzing Usage Information of an Information Management System to determine information policy violation (9,152,774)
  34. Techniques and System to Optimize Policy Deployment by Inspecting Code and Reducing Code Size Associated to a Target (9,203,868)
  35. Techniques of Transforming Policies to Enforce Control in an Information Management System (9,253,216)
  36. Preventing Conflicts of Interests Between Two or More Groups Using Applications (9,298,895)
  37. Protecting Information Using Policies and Encryption (9,313,182)
  38. Deploying Policies and Allowing Off-Line Policy Evaluations (9,384,363)
  39. Techniques and System for Specifying Policies Using Abstractions (9,384,360)
  40. Preventing Conflicts of Interests Between Two or More Groups (9,396,351)
  41. Technique and System to Analyze and Correlate Activity Data of an Information Management System (9,407,662)
  42. Enforcing Universal Access Control in an Information Management System (9,384,358)
  43. Enforcing Policy-Based Application and Access Control in an Information Management System (9,398,051)
  44. Protecting Documents Using Policies and Encryption (9,413,771)
  45. Detecting Behavioral Patterns and Anomalies Using Activity Data (9,311,503)
  46. Enforcing Control Policies in an Information Management System with Two or More Interactive Enforcement Points (9,457,219)
  47. Intelligent Policy Deployment Technique Based on Characteristics of the Targets (9,531,595)
  48. Detecting Behavioral Patterns and Anomalies Using Activity Data (9,558,193)
  49. Protecting Information Using Policies and Encryption (BLUEP031C2) (9,558,360)
  50. Inspecting Code and Reducing Code Size Associated to a Target (9,684,795)
  51. Transforming Policies to Enforce Control in an Information Management System (9,703,978)
  52. Deploying Policies and Allowing Offline Policy Evaluation (9,740,703)
  53. Detecting Behavioral Patterns and Anomalies Using Activity Profiles (9,767,302)
  54. Enforcing Policy-based Application and Access Control in an Information Management System (9,866,594)
  55. Multilayer Policy Language Structure (9,864,752)
  56. Information Management System with Two or More Interactive Enforcement Points (9,942,271)
  57. Advanced Method to Detect Behavioral Patterns and Anomalies Using Access Data (9,946,717)
  58. Protecting Documents Using Digital Rights Policies and Encryption Using Dynamic Authorization (9,961,049)
  59. Enforcing Access Control Policies in an Information Management System Across Multiple Applications (13/850,999)
  60. Protecting Information Using Digital Rights Policies and Encryption as Container (15/421,358)
  61. Techniques and System to Monitor and Log Access of Information based on System and User Context Using Policies (14/481,513)
  62. Approach to enforce Universal Access Control in an Information Management System using Centralized ABAC policy (15/199,634)
  63. Technique to Managing Access of Information Using Dynamic Policies (14/798,388)
  64. Technique to Prevent Conflicts of Interests Between Two or More Groups Using Policy (15/214,370)
  65. Technique to Analyzing Policies of an Information Management System using Policy Set and Reusable Policy Components (14/876,689)
  66. Technique to Share Digital Rights Protected Documents in a Web Browser (15/291,653)
  67. Preventing Conflicts of Interests Between Two or More Groups Using Applications (15/083,169)
  68. Protecting Documents with Centralized and Discretionary Policies (15/268,155)