Patent Portfolio

NextLabs holds 87 approved technology patents in the following areas:

List of 87 approved patents:

  1. Techniques and System to Deploy Policies Intelligently (7716240)
  2. Detecting Behavioral Patterns and Anomalies Using Information Usage Data (7774363)
  3. Preventing Conflicts of Interest Between Two or More Groups Using Applications (7877409)
  4. Enforcing Universal Access Control in an Information Management System (7877781)
  5. Techniques of Optimizing Policies in an Information Management System (8150816)
  6. Associating Code to a Target Through Code Inspection (8156566)
  7. Techniques and System to Optimize and Automatically Deploy Policies for Offline Execution (8185548)
  8. Analyzing Usage Information of an Information Management System (8244745)
  9. Detecting Behavioral Patterns and Anomalies Using Activity Profiles (8321437)
  10. Using Information Usage Data to Detect Behavioral Patterns and Anomalies (8396890)
  11. Enforcing Application and Access Control Policies Across Multiple Applications (8407345 B2)
  12. Enforcing Attribute-Based Access Control across Multiple Information Management Systems (8464314)
  13. Techniques of Transforming Policies to Enforce Control in an Information Management System (8544058)
  14. Enforcing Policy-Based Application and Access Control in an Information Management System (8595788)
  15. Enforcing and Automating Information Control Using Policies in a Distributed Environment (8621549)
  16. Enforcing Document Control Using Policies in a Distributed Information Management System (8627490)
  17. Techniques and System to Optimize Policy Deployment – Inspecting Code and Reducing Code Size Associated to a Target (8640191)
  18. Technique and system to Improve Policy Performance in an Information Management System (8661003)
  19. Enforcing Access Control Policies on Servers in an Information Management System (8677499)
  20. Using Centrally Managed Policy to Analyze and Correlate Policy Activities and Usage Data to Detect Behavioral Patterns and Anomalies in an Distributed Information Management System (8694523)
  21. Preventing Conflicts of Interests Between Two or More Groups Using Applications with Policy (8762412)
  22. Policy-driven Techniques and System to Monitor and Log Access of Information Based on System and User Context (8832048)
  23. Policy-based Approach to Protect Data Shared Using Encryption and Digital Rights Protection Technique (8843734)
  24. Technique to Analyze and Correlate Activity Data to Detect Risk and Anomaly (8849858)
  25. Detecting Behavioral Patterns and Anomalies Using Information Flow and Usage Activity Data (8862551)
  26. Deploying Policies and Allowing Off-Line Evaluations (8875218)
  27. Policy Optimization Technique for Inspecting Code and Reducing Code Size Associated to a Target (8904478)
  28. Enforcing Policy-Based Application and Access Control in an Information Management System (8959580)
  29. Technique and System to Preventing Conflicts of Interests Between Two or More Groups (8972449)
  30. Techniques of Transforming Policies to Enforce Control in an Information Management System (8990886)
  31. Protecting Documents Using Policies and Encryption (9064131)
  32. Techniques and System to Manage Access of Information Using Policies (9081981)
  33. Analyzing Usage Information of an Information Management System to determine information policy violation (9152774)
  34. Techniques and System to Optimize Policy Deployment by Inspecting Code and Reducing Code Size Associated to a Target (9203868)
  35. Techniques of Transforming Policies to Enforce Control in an Information Management System (9253216)
  36. Preventing Conflicts of Interests Between Two or More Groups Using Applications (9298895)
  37. Detecting Behavioral Patterns and Anomalies Using Activity Data (9311503)
  38. Protecting Information Using Policies and Encryption (9313182)
  39. Enforcing Universal Access Control in an Information Management System (9384358)
  40. Techniques and System for Specifying Policies Using Abstractions (9384360)
  41. Deploying Policies and Allowing Off-Line Policy Evaluations (9384363)
  42. Preventing Conflicts of Interests Between Two or More Groups (9396351)
  43. Enforcing Policy-Based Application and Access Control in an Information Management System (9398051)
  44. Technique and System to Analyze and Correlate Activity Data of an Information Management System (9407662
  45. Protecting Documents Using Policies and Encryption (9413771)
  46. Enforcing Control Policies in an Information Management System with Two or More Interactive Enforcement Points (9497219)
  47. Intelligent Policy Deployment Technique Based on Characteristics of the Targets (9531595)
  48. Detecting Behavioral Patterns and Anomalies Using Activity Data (9558193)
  49. Protecting Information Using Policies and Encryption (9558360)
  50. Inspecting Code and Reducing Code Size Associated to a Target (9684795)
  51. Transforming Policies to Enforce Control in an Information Management System (9703978)
  52. Deploying Policies and Allowing Offline Policy Evaluation (9740703)
  53. Detecting Behavioral Patterns and Anomalies Using Activity Profiles (9767302)
  54. Multilayer Policy Language Structure (9864752)
  55. Enforcing Policy-based Application and Access Control in an Information Management System (9866594)
  56. Information Management System with Two or More Interactive Enforcement Points (9942271)
  57. Advanced Method to Detect Behavioral Patterns and Anomalies Using Access Data (9946717)
  58. Protecting Documents Using Digital Rights Policies and Encryption Using Dynamic Authorization (9961049)
  59. Enforcing Access Control Policies in an Information Management System Across Multiple Applications (9973533)
  60. Approach to enforce Universal Access Control in an Information Management System using Centralized ABAC policy (10104125)
  61. Protecting Information Using Digital Rights Policies and Encryption as Container (10110597)
  62. Techniques and System to Monitor and Log Access of Information based on System and User Context Using Policies (10114965)
  63. Technique to Managing Access of Information Using Dynamic Policies (10181047)
  64. Technique to Prevent Conflicts of Interests Between Two or More Groups Using Policy (10223366)
  65. Technique to Analyzing Policies of an Information Management System using Policy Set and Reusable Policy Components (10289858)
  66. Technique to Share Digital Rights Protected Documents in a Web Browser (10303892)
  67. Preventing Conflicts of Interests Between Two or More Groups Using Applications (10380363)
  68. Protecting Documents with Centralized and Discretionary Policies (10387669)
  69. Using Dynamic Policy to Enable Secure Sharing of Encrypted Documents Within and Outside an Organization (10523423)
  70. Technique to Enforce Control Policies in an Information Management System with Two or More Interactive Enforcement Points (10536485)
  71. Technique to Protect Documents Using Policies and Encryption for Sharing (10554635)
  72. Technique to apply Dynamic Authorization Policy Across Multiple Application Programs with Requests Submitted Through an HTTP-Based API (10592683)
  73. Protecting Information Using Policies and Encryption (10873574)
  74. Sharing Encrypted Documents Within and Outside an Organization (10911223) 
  75. Dynamically Granting and Enforcing Rights on a Protected Document (10936739) 
  76. Using Centrally Managed Policy to Control Display Content of a Graphical User Interface (11042955) 
  77. Protecting Documents Using Policies and Encryption (11057355) 
  78. Protecting Documents with Centralized and Discretionary Policies (11132459) 
  79. Applying an Dynamic Authorization Policy Across Multiple Application Programs with Requests Submitted Through an HTTP-Based API (11347880
  80. Protecting Information Using Policies and Encryption
  81. Protecting Documents with Centralized and Discretionary Policies (10387669)
  82. Protecting a Document with a Security Overlay on a Web Browser
  83. Policies and Encryption to Protect Digital Information
  84. Protecting Documents Using Policies and Encryption (2599027
  85. Sharing Encrypted Documents Within and Outside an Organization (3497614)
  86. Protecting Information Using Policies and Encryption (12768404)
  87. Sharing Encrypted Documents Within and Outside an Organization (3866388)