Patent Portfolio
NextLabs holds 87 approved technology patents in the following areas:
Attribute-Based Policy Language
Policy Enforcement & Optimization
Policy Deployment & Targeting
Access Analytics
List of 87 approved patents:
- Techniques and System to Deploy Policies Intelligently (7716240)
- Detecting Behavioral Patterns and Anomalies Using Information Usage Data (7774363)
- Preventing Conflicts of Interest Between Two or More Groups Using Applications (7877409)
- Enforcing Universal Access Control in an Information Management System (7877781)
- Techniques of Optimizing Policies in an Information Management System (8150816)
- Associating Code to a Target Through Code Inspection (8156566)
- Techniques and System to Optimize and Automatically Deploy Policies for Offline Execution (8185548)
- Analyzing Usage Information of an Information Management System (8244745)
- Detecting Behavioral Patterns and Anomalies Using Activity Profiles (8321437)
- Using Information Usage Data to Detect Behavioral Patterns and Anomalies (8396890)
- Enforcing Application and Access Control Policies Across Multiple Applications (8407345 B2)
- Enforcing Attribute-Based Access Control across Multiple Information Management Systems (8464314)
- Techniques of Transforming Policies to Enforce Control in an Information Management System (8544058)
- Enforcing Policy-Based Application and Access Control in an Information Management System (8595788)
- Enforcing and Automating Information Control Using Policies in a Distributed Environment (8621549)
- Enforcing Document Control Using Policies in a Distributed Information Management System (8627490)
- Techniques and System to Optimize Policy Deployment – Inspecting Code and Reducing Code Size Associated to a Target (8640191)
- Technique and system to Improve Policy Performance in an Information Management System (8661003)
- Enforcing Access Control Policies on Servers in an Information Management System (8677499)
- Using Centrally Managed Policy to Analyze and Correlate Policy Activities and Usage Data to Detect Behavioral Patterns and Anomalies in an Distributed Information Management System (8694523)
- Preventing Conflicts of Interests Between Two or More Groups Using Applications with Policy (8762412)
- Policy-driven Techniques and System to Monitor and Log Access of Information Based on System and User Context (8832048)
- Policy-based Approach to Protect Data Shared Using Encryption and Digital Rights Protection Technique (8843734)
- Technique to Analyze and Correlate Activity Data to Detect Risk and Anomaly (8849858)
- Detecting Behavioral Patterns and Anomalies Using Information Flow and Usage Activity Data (8862551)
- Deploying Policies and Allowing Off-Line Evaluations (8875218)
- Policy Optimization Technique for Inspecting Code and Reducing Code Size Associated to a Target (8904478)
- Enforcing Policy-Based Application and Access Control in an Information Management System (8959580)
- Technique and System to Preventing Conflicts of Interests Between Two or More Groups (8972449)
- Techniques of Transforming Policies to Enforce Control in an Information Management System (8990886)
- Protecting Documents Using Policies and Encryption (9064131)
- Techniques and System to Manage Access of Information Using Policies (9081981)
- Analyzing Usage Information of an Information Management System to determine information policy violation (9152774)
- Techniques and System to Optimize Policy Deployment by Inspecting Code and Reducing Code Size Associated to a Target (9203868)
- Techniques of Transforming Policies to Enforce Control in an Information Management System (9253216)
- Preventing Conflicts of Interests Between Two or More Groups Using Applications (9298895)
- Detecting Behavioral Patterns and Anomalies Using Activity Data (9311503)
- Protecting Information Using Policies and Encryption (9313182)
- Enforcing Universal Access Control in an Information Management System (9384358)
- Techniques and System for Specifying Policies Using Abstractions (9384360)
- Deploying Policies and Allowing Off-Line Policy Evaluations (9384363)
- Preventing Conflicts of Interests Between Two or More Groups (9396351)
- Enforcing Policy-Based Application and Access Control in an Information Management System (9398051)
- Technique and System to Analyze and Correlate Activity Data of an Information Management System (9407662)
- Protecting Documents Using Policies and Encryption (9413771)
- Enforcing Control Policies in an Information Management System with Two or More Interactive Enforcement Points (9497219)
- Intelligent Policy Deployment Technique Based on Characteristics of the Targets (9531595)
- Detecting Behavioral Patterns and Anomalies Using Activity Data (9558193)
- Protecting Information Using Policies and Encryption (9558360)
- Inspecting Code and Reducing Code Size Associated to a Target (9684795)
- Transforming Policies to Enforce Control in an Information Management System (9703978)
- Deploying Policies and Allowing Offline Policy Evaluation (9740703)
- Detecting Behavioral Patterns and Anomalies Using Activity Profiles (9767302)
- Multilayer Policy Language Structure (9864752)
- Enforcing Policy-based Application and Access Control in an Information Management System (9866594)
- Information Management System with Two or More Interactive Enforcement Points (9942271)
- Advanced Method to Detect Behavioral Patterns and Anomalies Using Access Data (9946717)
- Protecting Documents Using Digital Rights Policies and Encryption Using Dynamic Authorization (9961049)
- Enforcing Access Control Policies in an Information Management System Across Multiple Applications (9973533)
- Approach to enforce Universal Access Control in an Information Management System using Centralized ABAC policy (10104125)
- Protecting Information Using Digital Rights Policies and Encryption as Container (10110597)
- Techniques and System to Monitor and Log Access of Information based on System and User Context Using Policies (10114965)
- Technique to Managing Access of Information Using Dynamic Policies (10181047)
- Technique to Prevent Conflicts of Interests Between Two or More Groups Using Policy (10223366)
- Technique to Analyzing Policies of an Information Management System using Policy Set and Reusable Policy Components (10289858)
- Technique to Share Digital Rights Protected Documents in a Web Browser (10303892)
- Preventing Conflicts of Interests Between Two or More Groups Using Applications (10380363)
- Protecting Documents with Centralized and Discretionary Policies (10387669)
- Using Dynamic Policy to Enable Secure Sharing of Encrypted Documents Within and Outside an Organization (10523423)
- Technique to Enforce Control Policies in an Information Management System with Two or More Interactive Enforcement Points (10536485)
- Technique to Protect Documents Using Policies and Encryption for Sharing (10554635)
- Technique to apply Dynamic Authorization Policy Across Multiple Application Programs with Requests Submitted Through an HTTP-Based API (10592683)
- Protecting Information Using Policies and Encryption (10873574)
- Sharing Encrypted Documents Within and Outside an Organization (10911223)
- Dynamically Granting and Enforcing Rights on a Protected Document (10936739)
- Using Centrally Managed Policy to Control Display Content of a Graphical User Interface (11042955)
- Protecting Documents Using Policies and Encryption (11057355)
- Protecting Documents with Centralized and Discretionary Policies (11132459)
- Applying an Dynamic Authorization Policy Across Multiple Application Programs with Requests Submitted Through an HTTP-Based API (11347880)
- Protecting Information Using Policies and Encryption
- Protecting Documents with Centralized and Discretionary Policies (10387669)
- Protecting a Document with a Security Overlay on a Web Browser
- Policies and Encryption to Protect Digital Information
- Protecting Documents Using Policies and Encryption (2599027)
- Sharing Encrypted Documents Within and Outside an Organization (3497614)
- Protecting Information Using Policies and Encryption (12768404)
- Sharing Encrypted Documents Within and Outside an Organization (3866388)