List of 77 approved patents:
- Enforcing Universal Access Control in an Information Management System (7877781)
- Techniques of Optimizing Policies in an Information Management System (8150816)
- Techniques and System to Deploy Policies Intelligently (7716240)
- Associating Code to a Target Through Code Inspection (8156566)
- Preventing Conflicts of Interest Between Two or More Groups Using Applications (7877409)
- Detecting Behavioral Patterns and Anomalies Using Information Usage Data (7774363)
- Techniques and System to Optimize and Automatically Deploy Policies for Offline Execution (8185548)
- Analyzing Usage Information of an Information Management System (8244745)
- Detecting Behavioral Patterns and Anomalies Using Activity Profiles (8321437)
- Using Information Usage Data to Detect Behavioral Patterns and Anomalies (8396890)
- Enforcing Application and Access Control Policies Across Multiple Applications (8407345 B2)
- Enforcing Attribute-Based Access Control across Multiple Information Management Systems (8,464,314)
- Techniques of Transforming Policies to Enforce Control in an Information Management System (8,544,058)
- Enforcing Policy-Based Application and Access Control in an Information Management System (8,595,788)
- Enforcing and Automating Information Control Using Policies in a Distributed Environment (8,621,549)
- Enforcing Document Control Using Policies in a Distributed Information Management System (8,627,490)
- Techniques and System to Optimize Policy Deployment – Inspecting Code and Reducing Code Size Associated to a Target (8,640,191)
- Technique and system to Improve Policy Performance in an Information Management System (8,661,003)
- Enforcing Access Control Policies on Servers in an Information Management System (8,677,499)
- Using Centrally Managed Policy to Analyze and Correlate Policy Activities and Usage Data to Detect Behavioral Patterns and Anomalies in an Distributed Information Management System (8,694,523)
- Policy-driven Techniques and System to Monitor and Log Access of Information Based on System and User Context (8,832,048)
- Preventing Conflicts of Interests Between Two or More Groups Using Applications with Policy (8,762,412)
- Policy-based Approach to Protect Data Shared Using Encryption and Digital Rights Protection Technique (8,843,734)
- Technique to Analyze and Correlate Activity Data to Detect Risk and Anomaly (8,849,858)
- Detecting Behavioral Patterns and Anomalies Using Information Flow and Usage Activity Data (8,862,551)
- Deploying Policies and Allowing Off-Line Evaluations (8,875,218)
- Policy Optimization Technique for Inspecting Code and Reducing Code Size Associated to a Target (8,904,478)
- Techniques of Transforming Policies to Enforce Control in an Information Management System (8,990,886)
- Enforcing Policy-Based Application and Access Control in an Information Management System (8,959,580)
- Technique and System to Preventing Conflicts of Interests Between Two or More Groups (8,972,449)
- Protecting Documents Using Policies and Encryption (9,064,131)
- Techniques and System to Manage Access of Information Using Policies (9,081,981)
- Analyzing Usage Information of an Information Management System to determine information policy violation (9,152,774)
- Techniques and System to Optimize Policy Deployment by Inspecting Code and Reducing Code Size Associated to a Target (9,203,868)
- Techniques of Transforming Policies to Enforce Control in an Information Management System (9,253,216)
- Preventing Conflicts of Interests Between Two or More Groups Using Applications (9,298,895)
- Protecting Information Using Policies and Encryption (9,313,182)
- Deploying Policies and Allowing Off-Line Policy Evaluations (9,384,363)
- Techniques and System for Specifying Policies Using Abstractions (9,384,360)
- Preventing Conflicts of Interests Between Two or More Groups (9,396,351)
- Technique and System to Analyze and Correlate Activity Data of an Information Management System (9,407,662)
- Enforcing Universal Access Control in an Information Management System (9,384,358)
- Enforcing Policy-Based Application and Access Control in an Information Management System (9,398,051)
- Protecting Documents Using Policies and Encryption (9,413,771)
- Detecting Behavioral Patterns and Anomalies Using Activity Data (9,311,503)
- Enforcing Control Policies in an Information Management System with Two or More Interactive Enforcement Points (9,457,219)
- Intelligent Policy Deployment Technique Based on Characteristics of the Targets (9,531,595)
- Detecting Behavioral Patterns and Anomalies Using Activity Data (9,558,193)
- Protecting Information Using Policies and Encryption (BLUEP031C2) (9,558,360)
- Inspecting Code and Reducing Code Size Associated to a Target (9,684,795)
- Transforming Policies to Enforce Control in an Information Management System (9,703,978)
- Deploying Policies and Allowing Offline Policy Evaluation (9,740,703)
- Detecting Behavioral Patterns and Anomalies Using Activity Profiles (9,767,302)
- Enforcing Policy-based Application and Access Control in an Information Management System (9,866,594)
- Multilayer Policy Language Structure (9,864,752)
- Information Management System with Two or More Interactive Enforcement Points (9,942,271)
- Advanced Method to Detect Behavioral Patterns and Anomalies Using Access Data (9,946,717)
- Protecting Documents Using Digital Rights Policies and Encryption Using Dynamic Authorization (9,961,049)
- Enforcing Access Control Policies in an Information Management System Across Multiple Applications (9,973,533)
- Protecting Information Using Digital Rights Policies and Encryption as Container (10,104,125)
- Techniques and System to Monitor and Log Access of Information based on System and User Context Using Policies (10,110,597)
- Approach to enforce Universal Access Control in an Information Management System using Centralized ABAC policy (10,114,965)
- Technique to Managing Access of Information Using Dynamic Policies (10,181,047)
- Technique to Prevent Conflicts of Interests Between Two or More Groups Using Policy (10,223,366)
- Technique to Analyzing Policies of an Information Management System using Policy Set and Reusable Policy Components (10,289,858)
- Technique to Share Digital Rights Protected Documents in a Web Browser (10,303,892)
- Preventing Conflicts of Interests Between Two or More Groups Using Applications (10,380,363)
- Protecting Documents with Centralized and Discretionary Policies (10,387,669)
- Using Dynamic Policy to Enable Secure Sharing of Encrypted Documents Within and Outside an Organization (10523423)
- Technique to Enforce Control Policies in an Information Management System with Two or More Interactive Enforcement Points (10536485)
- Technique to Protect Documents Using Policies and Encryption for Sharing (10,554,635)
- Technique to apply Authorization Policy Across Multiple Application Programs with Requests Submitted Through an HTTP-Based API (10,592,683)
- Dynamically Granting and Enforcing Rights on a Protected Document (15/957,850)
- Protecting Information Using Policies and Encryption (16/168,793)
- Sharing Encrypted Documents Within and Outside an Organization (16/730,996)
- European Patent (EP) No. 2599027 Title: Protecting Documents Using Policies and Encryption
- European Patent (EP) Application No. 17840238.4 – Title: Sharing Encrypted Documents Within and Outside an Organization