Issued Patents All Time
Showing 51–75 of 98 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9531595 | Intelligent policy deployment | — | 2016-12-27 |
| 9497219 | Enforcing control policies in an information management system with two or more interactive enforcement points | — | 2016-11-15 |
| 9413771 | Protecting documents using policies and encryption | Poon Fung, Andrew Han | 2016-08-09 |
| 9407662 | Analyzing activity data of an information management system | — | 2016-08-02 |
| 9396351 | Preventing conflicts of interests between two or more groups | — | 2016-07-19 |
| 9398051 | Enforcing policy-based application and access control in an information management system | — | 2016-07-19 |
| 9384358 | Enforcing universal access control in an information management system | — | 2016-07-05 |
| 9384360 | Techniques and system for specifying policies using abstractions | — | 2016-07-05 |
| 9384363 | Deploying policies and allowing off-line policy evaluations | — | 2016-07-05 |
| 9313182 | Protecting information using policies and encryption | — | 2016-04-12 |
| 9311503 | Detecting behavioral patterns and anomalies using activity data | — | 2016-04-12 |
| 9298895 | Preventing conflicts of interests between two or more groups using applications | — | 2016-03-29 |
| 9253216 | Techniques of transforming policies to enforce control in an information management system | — | 2016-02-02 |
| 9203868 | Inspecting code and reducing code size associated to a target | — | 2015-12-01 |
| 9152774 | Analyzing usage information of an information management system | — | 2015-10-06 |
| 9081981 | Techniques and system to manage access of information using policies | — | 2015-07-14 |
| 9064131 | Protecting documents using policies and encryption | Poon Fung, Andrew Han | 2015-06-23 |
| 8990886 | Techniques of transforming policies to enforce control in an information management system | — | 2015-03-24 |
| 8972449 | Preventing conflicts of interests between two or more groups | — | 2015-03-03 |
| 8959580 | Enforcing policy-based application and access control in an information management system | — | 2015-02-17 |
| 8904478 | Inspecting code and reducing code size associated to a target | — | 2014-12-02 |
| 8875218 | Deploying policies and allowing off-line policy evaluations | — | 2014-10-28 |
| 8862551 | Detecting behavioral patterns and anomalies using activity data | — | 2014-10-14 |
| 8849858 | Analyzing activity data of an information management system | — | 2014-09-30 |
| 8843734 | Protecting information using policies and encryption | — | 2014-09-23 |