Patent Portfolio
NextLabs holds 68 approved technology patents in the following area:
Dynamic Authorization
Attribute Based Access Control (ABAC)
Attribute-Based Policy Language
Policy Enforcement & Optimization
Access Analytics
Next generation Digital Rights Management
List of 68 approved patents:
- Enforcing Universal Access Control in an Information Management System (7877781)
- Techniques of Optimizing Policies in an Information Management System (8150816)
- Techniques and System to Deploy Policies Intelligently (7716240)
- Associating Code to a Target Through Code Inspection (8156566)
- Preventing Conflicts of Interest Between Two or More Groups Using Applications (7877409)
- Detecting Behavioral Patterns and Anomalies Using Information Usage Data (7774363)
- Techniques and System to Optimize and Automatically Deploy Policies for Offline Execution (8185548)
- Analyzing Usage Information of an Information Management System (8244745)
- Detecting Behavioral Patterns and Anomalies Using Activity Profiles (8321437)
- Using Information Usage Data to Detect Behavioral Patterns and Anomalies (8396890)
- Enforcing Application and Access Control Policies Across Multiple Applications (8407345 B2)
- Enforcing Attribute-Based Access Control across Multiple Information Management Systems (8,464,314)
- Techniques of Transforming Policies to Enforce Control in an Information Management System (8,544,058)
- Enforcing Policy-Based Application and Access Control in an Information Management System (8,595,788)
- Enforcing and Automating Information Control Using Policies in a Distributed Environment (8,621,549)
- Enforcing Document Control Using Policies in a Distributed Information Management System (8,627,490)
- Techniques and System to Optimize Policy Deployment – Inspecting Code and Reducing Code Size Associated to a Target (8,640,191)
- Technique and system to Improve Policy Performance in an Information Management System (8,661,003)
- Enforcing Access Control Policies on Servers in an Information Management System (8,677,499)
- Using Centrally Managed Policy to Analyze and Correlate Policy Activities and Usage Data to Detect Behavioral Patterns and Anomalies in an Distributed Information Management System (8,694,523)
- Policy-driven Techniques and System to Monitor and Log Access of Information Based on System and User Context (8,832,048)
- Preventing Conflicts of Interests Between Two or More Groups Using Applications with Policy (8,762,412)
- Policy-based Approach to Protect Data Shared Using Encryption and Digital Rights Protection Technique (8,843,734)
- Technique to Analyze and Correlate Activity Data to Detect Risk and Anomaly (8,849,858)
- Detecting Behavioral Patterns and Anomalies Using Information Flow and Usage Activity Data (8,862,551)
- Deploying Policies and Allowing Off-Line Evaluations (8,875,218)
- Policy Optimization Technique for Inspecting Code and Reducing Code Size Associated to a Target (8,904,478)
- Techniques of Transforming Policies to Enforce Control in an Information Management System (8,990,886)
- Enforcing Policy-Based Application and Access Control in an Information Management System (8,959,580)
- Technique and System to Preventing Conflicts of Interests Between Two or More Groups (8,972,449)
- Protecting Documents Using Policies and Encryption (9,064,131)
- Techniques and System to Manage Access of Information Using Policies (9,081,981)
- Analyzing Usage Information of an Information Management System to determine information policy violation (9,152,774)
- Techniques and System to Optimize Policy Deployment by Inspecting Code and Reducing Code Size Associated to a Target (9,203,868)
- Techniques of Transforming Policies to Enforce Control in an Information Management System (9,253,216)
- Preventing Conflicts of Interests Between Two or More Groups Using Applications (9,298,895)
- Protecting Information Using Policies and Encryption (9,313,182)
- Deploying Policies and Allowing Off-Line Policy Evaluations (9,384,363)
- Techniques and System for Specifying Policies Using Abstractions (9,384,360)
- Preventing Conflicts of Interests Between Two or More Groups (9,396,351)
- Technique and System to Analyze and Correlate Activity Data of an Information Management System (9,407,662)
- Enforcing Universal Access Control in an Information Management System (9,384,358)
- Enforcing Policy-Based Application and Access Control in an Information Management System (9,398,051)
- Protecting Documents Using Policies and Encryption (9,413,771)
- Detecting Behavioral Patterns and Anomalies Using Activity Data (9,311,503)
- Enforcing Control Policies in an Information Management System with Two or More Interactive Enforcement Points (9,457,219)
- Intelligent Policy Deployment Technique Based on Characteristics of the Targets (9,531,595)
- Detecting Behavioral Patterns and Anomalies Using Activity Data (9,558,193)
- Protecting Information Using Policies and Encryption (BLUEP031C2) (9,558,360)
- Inspecting Code and Reducing Code Size Associated to a Target (9,684,795)
- Transforming Policies to Enforce Control in an Information Management System (9,703,978)
- Deploying Policies and Allowing Offline Policy Evaluation (9,740,703)
- Detecting Behavioral Patterns and Anomalies Using Activity Profiles (9,767,302)
- Enforcing Policy-based Application and Access Control in an Information Management System (9,866,594)
- Multilayer Policy Language Structure (9,864,752)
- Information Management System with Two or More Interactive Enforcement Points (9,942,271)
- Advanced Method to Detect Behavioral Patterns and Anomalies Using Access Data (9,946,717)
- Protecting Documents Using Digital Rights Policies and Encryption Using Dynamic Authorization (9,961,049)
- Enforcing Access Control Policies in an Information Management System Across Multiple Applications (13/850,999)
- Protecting Information Using Digital Rights Policies and Encryption as Container (15/421,358)
- Techniques and System to Monitor and Log Access of Information based on System and User Context Using Policies (14/481,513)
- Approach to enforce Universal Access Control in an Information Management System using Centralized ABAC policy (15/199,634)
- Technique to Managing Access of Information Using Dynamic Policies (14/798,388)
- Technique to Prevent Conflicts of Interests Between Two or More Groups Using Policy (15/214,370)
- Technique to Analyzing Policies of an Information Management System using Policy Set and Reusable Policy Components (14/876,689)
- Technique to Share Digital Rights Protected Documents in a Web Browser (15/291,653)
- Preventing Conflicts of Interests Between Two or More Groups Using Applications (15/083,169)
- Protecting Documents with Centralized and Discretionary Policies (15/268,155)